The Latest in IT Security

Posts Tagged ‘scanner’

We are tracking another Blackhat SEO SPAM network being managed by http://joomlapoject.net. By the name of the domain, you can guess that they are targeting Joomla sites.When you visit a compromised site, you don’t see anything wrong, but if you view the source, there is a large block of spammy links hidden in there: <span style=”font-style: normal; visibility: hidden; position: absolute; left: 0px; top: 0px”><a href=”http://www.nigeriavillagesquare.com/t3-assets/css/index.php”>ACD Systems Canvas 11 with GIS Plus</a><br><a href=”http://www.nigeriavillagesquar.. […]

Read more ...

We are seeing the criminals behind fake anti-virus continuing to customize their social engineering attacks to be more believable to users and presumably more successful. Last week I wrote about fake Firefox malware warnings leading users to rogue security software. This week they’ve started to imitate Microsoft Update. The page is nearly an exact replica […]

Read more ...

13
May
2011

That Magic Lantern thing just keeps raising its head (and an ugly little head it is too, poor thing.) Earlier this week I was in Krems, Austria, for the EICAR conference,and the story was alluded to in a paper by Eric Filiol and Alan Zaccardelle called “Magic Lantern. Reloaded/Anti-Viral psychosis McAfee Case,” though it was kind […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments