The Latest in IT Security

Posts Tagged ‘Trojans’

News about the death of Steve Jobs has been exploited by cyber-criminals by sending spam emails associated with this incident. The spam mail which may have one of the following subjects: – Steve Jobs: Not Dead Yet. – Is Steve Jobs Really Dead?. – Steve Jobs Alive! or Steve Jobs Not Dead. If you have […]

Read more ...

This month, the Malicious Software Removal Tool (MSRT) targets two families: Win32/EyeStye and Win32/Poison. EyeStye (aka ‘SpyEye’) is a family of trojans that steals information, targeting authentication data used for online banking such as passwords and digital certificates. The method it employs is called “form grabbing” which involves the interception of webform data submitted to […]

Read more ...

According to Wikipedia QR code is a type of matrix barcode (or two-dimensional code) first designed for the automotive industry. QR codes are becoming more and more popular today and are used in banners, magazines, transport and badges in order to provide quick and easy access to particular information. A QR code has a pretty […]

Read more ...


Categories

SATURDAY, JUNE 07, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments