The Latest in IT Security

Posts Tagged ‘wp’

Last week, our friends at ThreatPost posted about the ever-growing infection of websites hosting Black Hole Exploit Kits. A Black Hole exploit takes advantage of unpatched Windows operating systems. It also targets other software, such as Java and Adobe Reader, that can be installed on Windows platforms, which are a lot. Since the kits are already available in […]

Read more ...

We are seeing an interesting trend lately. A site gets compromised and starts to distribute malware to its users. The webmaster (owner of the site) searches everywhere for malicious strings, and can’t find anything. Where can it be hidden? It could be outside the root directory of your site. On many sites we analysed in […]

Read more ...

This blog post could have been titled also as “A trip from Nigeria to Libya”. Perhaps one of the best-known email scams is the Nigerian letter scam and its many variants. The http://pandalabs.pandasecurity.com/es/wp-admin/post-new.phpinitial email tries to convince recipients that there are several million dollars which cannot legally leave Nigeria unless transferred to a foreign account. […]

Read more ...


Categories

FRIDAY, APRIL 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments