• Increase font size
  • Default font size
  • Decrease font size

Fly Phishing - Comerica TM

Fly Phishing

Some phishing gangs have a new technique. They're using trojan-spy applications.
Last week we received the following e-mail message:

Last Updated on Wednesday, 30 April 2008 22:54


Potential trojan infection.
Last Updated on Sunday, 30 March 2008 23:43

IBM unleashes virus on AusCERT delegates

Delegates to AusCERT, Australia's premier information security event held this week on the Gold Coast, have taken home a little of the stuff they spent the week agonising over - a virus.
Last Updated on Tuesday, 25 May 2010 23:45

Facebook users suffer second 'sexy' malware attack

Users tricked by video scam of 'distracting beach babes'.

Security experts have called on Facebook to set up an early warning system on its network to notify users of any threats as and when they occur, after yet another malware attack hit the site over the weekend.


RSA hackers exploited Flash zero-day bug

By Gregg Keizer April 3, 2011 07:45 AM ET

Computerworld - Last month's hack of RSA Security began with an exploit of a then-unpatched vulnerability in Adobe Flash Player, the company confirmed Friday.

According to RSA, attackers gained access to its network by sending two small groups of employees e-mails with attached Excel spreadsheets. One of those employees opened the attachment, which was titled "2011 Recruitment plan.xls."


Last Updated on Sunday, 16 June 2013 15:25

DDoS Anniversary

There was a "cyberwar" in Estonia one year ago. Civil unrest, protests, and rioting culminated in DDoS attacks against Estonian government websites. What started on the streets moved online with those that couldn't be physically present taking part in DDoS attacks that lasted for more than a week.


Analyzing a Stuxnet Infection with the Sysinternals Tools, Part 1

An excellent article on the analysis of the Stuxnet malware is found in the article below.

Analyzing a Stuxnet Infection with the Sysinternals Tools, Part 1


The author of this article is the creator of the popular and useful tools called Sysinternals. The article describe how it was possible to use the Sysinternals tools to discover signs of the Stuxnet virus.


Page 2 of 3


How can this site be improved?

Who's Online

We have 7 guests online