The Latest in IT Security

Posts Tagged ‘screenshot’

Normally, a “mirror site” is a site that “mirrors” (copies) the content of another site, as a form of backing up important data, or helping to spread the bandwidth load for popular content. A few weeks ago, however, I was seeing something interesting in one of the shady networks we track. Take a look at […]

Read more ...

I’m almost certain pretending to be the Department of Defense is not a good idea, but then it’s not like a 419 scammer has that many of those in the first place. In fact, they can’t even format an email properly so here’s my best attempt at getting as much of it into the screenshot […]

Read more ...

  Among the many different trojans that spread on Facebook, something popped up recently that caught our particular attention. The threat, detected by ESET as Win32/Delf.QCZ, is interesting for several reasons. Distribution First, let’s look at the distribution vector. Win32/Delf.QCZ relies on the old “fake codec/media player trick” and links to the malware-laden site are […]

Read more ...


Categories

FRIDAY, APRIL 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments