The Latest in IT Security

Posts Tagged ‘unmonitored’

Yesterday, we wrote about the return of Amazon spam, and how criminals behind this campaign led users to have their software exploited via the Blackhole exploit kit, especially if they’re not properly patched. At the end of that entry, we included a list of campaigns that use popular brand names that criminals bank on to […]

Read more ...

This fake twitter spam leads to malware at saprolaunimaxim.ru. Date:      Tue, 12 Jun 2012 12:43:11 -0500 From:      Twitter Subject:      Confirm your Twitter account, xxxxxxxx! Hi, xxxxxxxx. Please confirm your Twitter account by clicking this link: Please click here. Once you confirm, you will have full access to Twitter and all future notifications […]

Read more ...

This fake Twitter spam leads to a fake pharmacy at medsdose.com but it could easily be adapted for malware. Date:      Thu, 26 Apr 2012 19:43:05 +0000 From:      Twitter [[email protected]] To:      [email protected] Subject:      Unusual activity with your account! Hi, [email protected] Our system detected unusual activity associated with your account. Your account may […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments