Search Results for: apple app
Steer clear of Tumblr hosted phish pages
If you’re a Tumblr user, be very wary of Tumblr user pages asking you to “Login to see Adult Content”. It’s a scam, and these pages are stealing your credentials. Click to Enlarge “This page contains adult content. Please revalidate …
Beware the Malware Banner
Have you already heard about the banner trick? Not yet? This is one of the latest sophisticated additions found in the Zeus malware configuration. This addition has been recently discovered, analyzed and reported by Trusteer. Malware such as Zeus place …
"Dear Apple Store Customer…"
Given the insane amount of high visibility data breaches taking place at the moment, it’s no wonder that spammers would probably delight in zinging around “your order has been cancelled” mails. Here’s a supposed “Apple Store purchase” that has apparently …
Doing the right thing
Amazon.com just did a very admirable thing — they admitted they had possibly mis-represented the actual quality of video delivered to me (not that I noticed or actually even cared), and they gave me a credit. Hello, As someone who …
Use Lastpass? Change your master password asap
This is not good at all. Lastpass (the rather excellent Password management system) has potentially been compromised, and although the Lastpass team were quick to spot the shenanigans taking place they’ve advised users to change their master password (in fact, …
The 16 Most (Potentially) Dangerous Applications on your Network
System admins know the importance of keeping up with operating systems patches on their workstations and servers, and making sure their antivirus definitions are kept up to date. We plan for and test regularly Microsoft’s monthly releases, and ensure 100% …
Apple iTunes page infected
On that whole SQL injection thing, here’s an interesting one I found while stumbling around researching today. Hmm…What’s that all about? Any more pages like this? Let’s see! Well, yeah. There’s err, a few. I found a some more, and …
Internet Monitoring: both sides of the table (Part 2)
In the first part of this article we saw the legal parameters within which organizations implement internet monitoring. It’s easy to understand why employees feel concerned about being monitored at work. After all it’s human nature to feel uneasy knowing …
Top 3 Patch Management Do’s and Don’ts
A successful patch management process is a critical part of any network, no matter how many or how few systems you are maintaining. There are a few key things you should include to maximize the effectiveness of your patching process, …
Devices, Devices, Devices Everywhere
Once upon a time, way back in 2006, just before Microsoft were about to release Windows Vista. If I remember correctly this program was codenamed EVO – Exchange, Vista & Office, and MS were spending tons of money on hype …









