The Latest in IT Security

Posts Tagged ‘screenshot’

Using social engineering tricks, a developer can create an app that tricks users into tapping a specifically-crafted app popup window (called toast view), making it a gateway for varied threats.This attack, dubbed tapjacking, takes advantage of a specific vulnerability in Android user interaction (UI) component.This technique is not very complicated but has serious security implications […]

Read more ...

Recently we have noticed a new variant of backdoor malware spreading in UK networks using interesting anti-virtual machine tricks.Today’s malware uses anti-emulation and anti-debugging tricks on a daily basis to prevent malware researchers from debugging or emulating a particular sample. The vast majority of malware files still consist of simple anti-emulation tricks like calling less […]

Read more ...

Last week we wrote a blog about a specific Facebook scam that appeared to spread rather aggresively. We have decided to nickname the scam "Jacked Frost." The Websense® ThreatSeeker™ network detected that the scam has increased and multiplied over the weekend – particularly on Saturday where we saw the amount of unique URLs related to this scam double. This shows how cyber crooks time […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments