The Latest in IT Security

Posts Tagged ‘URLs’

We’re seeing quite a few of these “Can I use your…” style messages arriving in mailboxes, taking the form of fake Twitter DM notifications. The most common fakeouts seem to be asking about videos and photographs. Click to Enlarge Hello, Can i publish link to your photo on my web page? Another one says: Hi. […]

Read more ...

You may want to open the first blog post we did on Fake AV in December 2009, three years ago, side by side with this post. See if you can spot the differences… fake antivirus pages in 2012 are nearly the same as they were three years ago and most AV solutions still fail to […]

Read more ...

Last week we wrote a blog about a specific Facebook scam that appeared to spread rather aggresively. We have decided to nickname the scam "Jacked Frost." The Websense® ThreatSeeker™ network detected that the scam has increased and multiplied over the weekend – particularly on Saturday where we saw the amount of unique URLs related to this scam double. This shows how cyber crooks time […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments