The Latest in IT Security

Posts Tagged ‘enum’

From time to time, we register higher than usual volumes of malicious spam emails being spread in certain locations. These spam campaigns are usually geographically and language specific  to make them more trustworthy  and successful but otherwise are very similar. They can take the guise of a fake traffic ticket from the New York State […]

Read more ...

We rely on a good amount of automation and virtualization in our battle against malware. Our opponents, malware authors, know this and they frequently employ new tactics to avoid being processed by our back end systems. One particularly prevalent threat is a “banking trojan” called ZeuS. In the past, we’ve written about a ZeuS variant […]

Read more ...


Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments