The Latest in IT Security

Posts Tagged ‘sha’

An SMS-sending Trojan, which targets mobile devices with Java midlet installed, has been circulating in Malaysia. Some victims reported that they have been receiving an SMS message which appears to be an update from Samsung. A message that appears as an update from Samsung But upon clicking the link, they are redirected to another link […]

Read more ...

Since the public release of MS12-020 bulletin, there have been plenty of attempts to exploit the Remote Desktop Protocol (RDP) vulnerabilities. Last week, we received a related sample, which turned out to be a tool called ‘RDPKill by: Mark DePalma’ that was designed to kill targeted RDP service. The tool was written with Visual Basic […]

Read more ...

Ever wonder where the term “Pwned” came from? Rumour has it that is started with the game World of Warcraft (WoW), where a map designer, intending to write “the player has been owned”, mistyped it as “the player has been pwned”. In any case, it is widely used today to mean you have been screwed […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments