The Latest in IT Security

Posts Tagged ‘Spoof’

I don’t want your heads to explode with the force of a thousand Suns, but I think we may be looking at a new Rogue AV gimmick – specifically in the area of Codecs. I know, I know. Breathe deeply and take a seat. Researcher Adam Thomas was investigating some FakeVimes Rogues, installing one of […]

Read more ...

Our friends at Commtouch have blogged about something that is no surprise – spammers using compromised accounts vs. bots (their latest threat report is quite good and worth reading btw). While compromised email accounts (hotmail, yahoo, gmail, etc.) are not new, there is a little more to it:  There was a massive takedown of a […]

Read more ...

07
Jun
2011

There are many dangerous threats lurking in cyberspace today, from software vulnerabilities and exploits, to viruses and botnets. Among these threats are phishing attacks, an electronic communication scam that attempts to secure highly personal information such as credit card info, user names and passwords by assuming the identity of a trustworthy entity. The trustworthy entity […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments