The Latest in IT Security

Posts Tagged ‘ru’

This past month, I’ve seen an increase in hijacked sites redirecting to a Fake AV page. These attacks typically involves three separate phases: The hijacked website redirects users coming from a Google search to an external domain. A website redirects users to the Fake AV page or to a harmless site (mostly bing.com and google.com) […]

Read more ...

Another malicious spam pointing to cpojkjfhotzpod.ru:8080 Date:      Wed, 21 Feb 2012 06:09:01 -0800 From:      “Keitha Hanks” Subject:      Urgent! Check the access to your card! We have detected operations with large amounts on your card which fact had not previously been observed. Please, familiarize yourself with the copies and contact us in case […]

Read more ...

A slightly different spam from the usual Xerox rubbish, but with a similar malicious payload.. this time on the domains coajsfooioas.ru and tuberkulesneporok.ru. Date:      Tue, 13 Feb 2012 04:59:42 +0900 From:      “DELL AVILES” Arch Coal Corp . [AfinaGuridi@auburn.edu] Subject:      Re: Intercompany inv. from Arch Coal Corp. Attachments:     Invoice_02_7_h158329.htm Good day Attached […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments