The Latest in IT Security

Posts Tagged ‘php file’


Vulnerable websites are regularly hijacked to redirect users to malicious domains. The most popular type of of malicious page are Fake AV pages. Attackers commonly increase traffic to these hijacked websites using Blackhat SEO techniques. Blackhat SEO requires that two different pages be delivered to different audiences: A harmless spam page to the Googlebot and […]

Read more ...

We discovered a series of really nasty spam mails that have a lot to offer. There are various types of it, with different subject, seemingly connected to the geographical areas they are spread in. Let’s have a look at an email we discovered in Poland:More email examples can be found at the bottom of this […]

Read more ...

We are seeing an interesting trend lately. A site gets compromised and starts to distribute malware to its users. The webmaster (owner of the site) searches everywhere for malicious strings, and can’t find anything. Where can it be hidden? It could be outside the root directory of your site. On many sites we analysed in […]

Read more ...


MONDAY, JULY 15, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments