The Latest in IT Security

Posts Tagged ‘web applications’

Ransomware continuously evolves and updates its social engineering tactics to trick users into paying money to the cybercriminals.The samples we’re seeing today not only leverage the Federal Bureau of Investigation (or any police authority for that matter), but on this occasion also use a non-malicious .MP3 file!This audio file repeatedly informs users that their system […]

Read more ...

Analysis: Kevin Savage Following our recent blog post on malicious Web injects, here is an example affecting the distribution of a malicious Android application. This is an example of a traditional type but on a larger scale. Those of us in the security industry are well aware of a certain email address—jamesnorthone@hotmailbox.com—which registers domains consistently […]

Read more ...

During the last couple of days I have together with Yury Namestnikov been investigating the extremely high numbers of infected websites. It all started when I was going through local statistics for Sweden and saw an increase of a certain JavaScript redirector, and also new detections on new variants for Java, PDF and Flash exploits. […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments