The Latest in IT Security

Posts Tagged ‘search result’

For some years now, FAKEAV has been a plague in Windows systems. It’s only recently that this variant has entered the Mac OS X scene. As was the case with Windows-based FAKEAV, the most common infection vector for Mac FAKEAV is through poisoned search terms.Take for example the following poisoned search result:Accessing the website while […]

Read more ...

Attackers usually use some form of social engineering technique to fool users into downloading and executing a malicious executable – they scare users with a fake antivirus page, they present users with a video that requires a new software or codec update, they claim the user’s browser or Flash version is out of date, etc. […]

Read more ...

There is no doubt that athletes all around the world are training hard to compete at the London Olympics in 2012, but cyber criminals seem to be gearing up for the event as well. Even with over 400 days still to go until the Olympics, we have already started seeing search terms related to this […]

Read more ...


Categories

SUNDAY, MAY 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments