• Home
  • Jacksch
  • Bulletins
  • Subscribe
  • Resources
    • Gartner Magic Quadrants
    • Blogs and News
  • Terms of Use
    • Privacy Policy
  • Contact
Search
Security Shelf Logo Security Shelf Logo Security Shelf
  • Home
  • Jacksch
  • Bulletins
  • Subscribe
  • Resources
    • Gartner Magic Quadrants
    • Blogs and News
  • Terms of Use
    • Privacy Policy
  • Contact
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
  • Security

Right-to-Left Override Aids Email Attacks

By
News
-
September 26, 2011

Computer crooks and spammers are abusing a little-known encoding method that makes it easy to disguise malicious executable files (.exe) as relatively harmless documents, such as text or Microsoft Word files.

  • TAGS
  • Microsoft
SHARE
Facebook
Twitter
  • tweet
Previous articleFacebook Changes To Open Door To Interactive Scams
Next articlePanda Security axes jobs, gets new chief exec
News

RELATED ARTICLESMORE FROM AUTHOR

North Korean IT Workers Are Infiltrating Tech Companies

Conti: Russian-backed rulers of Costa Rican hacktocracy?

SolarWinds ready to move past breach and help customers manage theirs

Daily or weekly news?


Jacksch on Security
  • Small business cybersecurity Q&A session
  • Free cybersecurity webinars for small business
  • You get what you pay for
  • Apricorn continues to impress
  • Stop contributing to the global cybercriminal haul
  • Move to secure IoT Devices
  • Can we eliminate the password?
  • Alert? What alert?
More Jacksch on Security
Archives
Tags
attacker awareness backdoor biometrics bitcoin Brazil Breach BYOD Canada china Cisco cloud crime crypto D-Link dos facebook firewall Google hacker intelligence IoT korea Lavabit malware Microsoft military mobile NSA password payment privacy ransomware security Snowden social spam Threat Intelligence Trump twitter USA vulnerability Yahoo
Terms of Use
The views expressed on this site are those of the author alone and do not necessarily reflect the views of any other other entity. By using this site you agree to our Terms of Use and Privacy Policy.
Security Shelf Logo
ABOUT US
Security news, views, and resources.
FOLLOW US
© Copyright 2013-2020 SecurityShelf.com. All Rights Reserved.

Posting....