The Latest in IT Security

Posts Tagged ‘threat research’

1. Email messages impersonating LinkedIn correspondence used as lure to Blackhole sites Blackhole users have begun using phishing emails that impersonate correspondence from the professional networking site LinkedIn to trick users into going to Blackhole Exploit Kit sites. The links in the phishing emails take the users to an exploit server. Email subject lines include: […]

Read more ...

Senior Security Manager – Vulnerability Research Posted: 5 March 2012 Company name: McAfee Location: Santa Clara, CA United States Poster represents: employer Terms of employment: Salaried employee Description:Job Description Sr. Security Manager – Vulnerability Research Location: Santa Clara, CA About the Role: The Person that takes this role will be working within McAfee Labs to […]

Read more ...

Brod, a researcher on our Threat Research team has been tasked with tracking emerging Mac based threats. Microsoft Excel is one of the tools he uses to chart variants. From April to December 2011, there have been several dozen new Mac threats. Well, that’s nothing when compared to Windows malware — but it’s definitely something […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments