The Latest in IT Security

Posts Tagged ‘scripts’

Rogue:Win32/FakePAV reappeared about two weeks ago after a brief hiatus and since then we’ve been seeing variants with new names for themselves just about every day. The latest versions call themselves names like “Windows Threats Destroyer”, “Windows Firewall Constructor”, “Windows Attacks Preventor”  and “Windows Basic Antivirus”. You can see some examples of these iterations below. […]

Read more ...

Internet users are receiving emails claiming to contain a changelog – but the files attached are really designed to infect computers. Here’s what a typical email looks like, although the precise wording can vary. Subject: Re: Your Changelog Message body: Good day, as promised chnglog attached (Open with Internet Explorer) The subject lines and attachment […]

Read more ...

Wikipedia is blacked out because of a protest about SOPA. But what happens if you really, really need Wikipedia? The good news is that you can still access it on your smartphone, or by accessing the mobile site directly. You can also temporarily by disabling Javascript in your browser when visiting the site (specifically blocking […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments