The Latest in IT Security

Posts Tagged ‘url path’

Here are a couple of interesting sites: and (There are also some variants on the "TJL" initials — mixing their order — but these all resolve to the site. No variants for the domain have shown up, but we'll keep our eyes open.) Besides looking identical, there are more similarities: Both live on […]

Read more ...

PDF exploits have been targeted by Blackhole exploit kits for some time now. The Blackhole exploit kit will deliver various malicious PDF files to a user if the victim is running a potentially vulnerable version of Adobe Reader. When these PDFs are opened through Adobe Reader, a known vulnerability is exploited which will then compromise […]

Read more ...

This past month, I’ve seen an increase in hijacked sites redirecting to a Fake AV page. These attacks typically involves three separate phases: The hijacked website redirects users coming from a Google search to an external domain. A website redirects users to the Fake AV page or to a harmless site (mostly and […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks