The Latest in IT Security

Posts Tagged ‘phisher’

Phishers, scammers and other attackers love free hosting services. They constantly need to set up plenty of malicious sites as their old ones are taken down or blacklisted. Fake AV authors loved co.cc, a free DNS service that allows them to redirect users to sites such as flashupdate.co.cc. They then used a similar service from cz.cc, […]

Read more ...

Part of the complete engineering of phishing attacks is the authentic look of the actual phishing site. There are traditional bank phishing pages with simple username, password combinations such as this Lloyds phishing site: But what’s a phisher to do if the authentic site adds more complex features – like a virtual keyboard? Copy the […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments