The Latest in IT Security

Posts Tagged ‘3pm’

Our investigation of the June 25 South Korea incident led us to the compromise of an auto-update mechanism attack scenario. As part of our continuous monitoring, we documented another scenario (presented in this blog entry) pertaining to a DDoS attack scenario launched at specific sites.The recent attack against South Korean websites has revealed a certain […]

Read more ...

Regular readers of Naked Security will know that I have some strong feelings about timestamps in logfiles. In particular, the ambiguities created by logfiles based on local time – which is subject to local timezone regulations and changes – can work against your security interests. Here’s one reason why: “..Don’t let year-ends, timezones, daylight saving […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments