Thanks to the co-author of this blog, Wahengbam RobinSingh.
Phishers are constantly looking for new ideas in their efforts of tricking end users. In August, Symantec observed a phishing site
Category: Security Response
Picture this news story: “42 suspects in three countries were arrested today in connection with the attempted theft of intellectual property from XYZ Corp. XYZ Corp. worked with law enf
There has been a lot of coverage of the recent RDP capable W32.Morto worm, but one of the more interesting aspects of the worm’s behavior appears to have been overlooked. Most ma