The Latest in IT Security

Posts Tagged ‘two ways’

We’ve seen a number of cases wherein phishers have used compromised Twitter accounts to send direct messages (DMs) to their followers. We’re now beginning to see this same tactic used in Facebook in the form of private messages (PMs), and this isn’t just some spam mail in your inbox claiming you have received a “private message”.As of […]

Read more ...

Android malware has been around for a while now, but it has been somewhat uncertain how prevalent infected devices are. The Wildlist has been used as a measure to show which viruses are prevalent. What is interesting about the first Extended Wildlist in August 2011 is the inclusion of three pieces of Android-based malware. I […]

Read more ...

Hot on the heels of last week’s malicious attachment spam, we are now observing another large malicious spam campaign – this time without attachments. Like the majority of last week’s campaigns, this spam is being sent out from the Cutwail botnet. The message arrives as a fake Facebook friend invite notification. The message looks convincing, […]

Read more ...


Categories

MONDAY, JANUARY 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments