The Latest in IT Security

Posts Tagged ‘intrusions’

Most cybersecurity work is geared towards finding ways to prevent intrusions – passwords, two-factor authentication, firewalls, to name a few – and to identify the “chinks in the armor” that need to be sealed. The characteristics of malware are shared publicly, to give everyone from system administrators through users a heads up to guard against […]

Read more ...

Chinese intruders gang used to transfer malware in a simple manner – using DropBox and WordPress functionality.The gang is called ‘DNSCalc’, known mainly due to its past intrusions to The New York Times servers and collection of information for months until discovered.This time it turns out that the gang was able to install malware on […]

Read more ...

In the morning of May 12th our malware outbreak sensors registered another BlackHole outbreak hitting one of the Top 200 Alexa rank domains: Answers.com. Its RSS feed generated resource was infected with BlackHole exploit kit. The XML output file at the URL feeds.answers.com was prepended with an obfuscated JavaScript. The malicious code looks like this: […]

Read more ...


Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments