The Latest in IT Security

Posts Tagged ‘Validation’

This “LiveJournal” spam actually leads to a fake pharma site, but it could be adapted easily to deliver malware: Date:      Sun, 22 Apr 2012 04:21:28 +0000 From:      “LiveJournal.com” [do-not-reply@livejournal.com] Subject:      Welcome to LiveJournal Congratulations! Thanks for creating a new journal at LiveJournal! Please click here to complete validation and set your primary […]

Read more ...

Large outbreaks of phony AT&T wireless emails have been distributed in the last 2 days. The emails describe very large balances ($943 in the example below), that are sure to get aggravated customers clicking on the included links. Every link in the email leads to a different compromised site that has malware hidden inside. In […]

Read more ...

SSL certificates are used to validate the identity of a website to users. Over the weekend, it was found that DigiNotar, a Dutch Certificate Authority, had issued a rogue SSL certificate for *.google.com. Today, this was confirmed by DigiNotar in a press release.According to DigiNotar’s own investigation, they found out that they were compromised on […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments