The Latest in IT Security

Posts Tagged ‘trojan files’

Since last week, we have seen many specially crafted files exploiting CVE-2012-0158, a vulnerability in MSCOMCTL.OCX in Microsoft Office and some other Microsoft products. This exploit can be implemented in a variety of file formats, including RTF, Word, and Excel files. We have already found crafted RTF and Word files in the wild. In the […]

Read more ...

Have you received an email with an “ACH Payment xxxxx Canceled” subject line?  Please don’t open the link in the email, as it will take you to a malicious URL. Websense® ThreatSeeker® Network has detected that an email campaign broke out on 27th September, 2011. In this campaign,  all the emails had the subject line “ACH Payment xxxxxx Canceled”, where xxxxx is a random […]

Read more ...


Categories

FRIDAY, MAY 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments