The Latest in IT Security

Posts Tagged ‘combinations’

The email Potential victims receive an email with an impersonal form of address and more or less detailed information about the EV-SSL certification process. G Data SecurityLabs have registered four different email designs so far. Here is a selection of subject lines encountered so far: EV-SSL-Zertifikat-App im Smartphone Betriebssystem EV-SSL-Zertifikat. Smartphone Betriebssystem Extended Validation-Zertifikate im […]

Read more ...

As in previous years, we are used to see a peak in the phishing attacks starting at the beginning of December and ending in the middle of January. If beginning of December makes perfectly sense, you might have asked yourself why middle of January. Because then people send back the presents they didn’t want to […]

Read more ...

Smartphone security expert Graham Lee offers some simple advice on how better to protect your iPhone or iPad. The iPhone – along with the rest of Apple’s iOS product family – seems to me to be the TARDIS of the computing world. There’s a full-featured UNIX computer with almost permanent network access, and it fits […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments