The Latest in IT Security

Posts Tagged ‘south africa’

This fake Adobe spam leads to malware on guuderia.ru:From: messages-noreply@bounce.linkedin.com [mailto:messages-noreply@bounce.linkedin.com] On Behalf Of Donnie Cherry via LinkedInSent: 07 March 2013 12:39Subject: Order N40898Good afternoon,You can download your Adobe CS4 License here –We encourage you to explore its new and enhanced capabilities with these helpful tips, tutorials, and eSeminars.Thank you for buying Adobe InDesign CS4 […]

Read more ...

This spam leads to malware on vanishingmasers.ru: Date:      Thu, 12 Apr 2012 15:14:41 -0300 From:      “Lidia Polk” [uzbekistanqp39@sterkinekor.com] Subject:      RE: Wire transfer cancelled Good afternoon, Wire transfer was canceled by the other bank. Rejected transaction: FEDWIRE REFERENCE NUMBER: SK9415179747ODP36641K Wire Transfer Report: View The Federal Reserve Wire Network The payload is on […]

Read more ...

Another malicious HTML-in-ZIP attack, this time leading to malware on samsonikonyou.ru From: ROSALBA Poe [mailto:victimname@hotmail.com] Sent: 28 March 2012 19:34 Subject: Scan from a Xerox WorkCentre Pro #25825448 Please open the attached document. It was scanned and sent to you using a Xerox Center Pro . Sent by: Guest Number of Images: 8 Attachment File […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments