The Latest in IT Security

Posts Tagged ‘technical details’

The hotel booking spam recently reported has made its way into German users’ inboxes. The email purporting to be from one of the Brenners Park-Hotel and Spa in Austria has a similar theme to its English counterpart as it contains confirmation and details on an alleged booking reservation.The email sample above was sent to a […]

Read more ...

On Friday, 21 September 2012, at 10:52:27, the G Data SecurityLabs detected a malicious website containing a partially obfuscated and suspicious looking JavaScript. We suspect that this detected attack is one of the first attempts to use the exploit in a modified version and in a large scale attack, which stands in contrast to the […]

Read more ...

There have been persistent media reports that the Shamoon wiper malware we previously covered is linked to attacks against Saudi Aramco.The hardcoded date in the body of destructor matches exactly the declaration by a hacker group about the date and time when the Saudi Aramco company would had been hit but we still cannot definitively […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments