The Latest in IT Security

Posts Tagged ‘servers’

This spam leads to malware on ganiopatia.ru: Date:      Mon, 26 Nov 2012 02:31:10 -0500 From:      sales1@victimdomain.com Subject:      RE: ALINA – Copies of Policies. Unfortunately, I cannot obtain electronic copies of the Ocean, Warehouse or EPLI policy. Here is the Package and Umbrella, and a copy of the most recent schedule. ALINA Prater, […]

Read more ...

Have you heard of the file sftp-config.json? You haven’t? Neither did we until a few weeks ago. It is used by some SFTP/FTP clients (Sublime SFTP is one) to pre-configure SFTP/FTP connections to remote sites and it contains some useful information in there (not encrypted): “type”: “ftp”,..“host”: “FTP HOST”,“user”: “FTP USER”,“password”: “FTP PASS”,“port”: “21″, Which […]

Read more ...

In the previous quarter, we reported that we protected against more than 142 million threats in the first half of 2012 alone. One prominent threat in this period was ZACCESS, which is also known as ZeroAccess or SIREFEF. It can push fake applications and other malware onto infected systems, while using its rootkit capabilities to […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments