The Latest in IT Security

Posts Tagged ‘necessary steps’

Do you know someone who can’t navigate and instead of the well known websites receives errors like “Unable to resolve the DNS address” “Server not found” “The webpage is not available” ? He might be infected with the DNSChanger malware and since July 9th 2012, the temporary servers which were set up by the FBI […]

Read more ...

Further analysis of the OSX.Flashback botnet has shed more light on how profitable such a botnet can be. Previously, we wrote that OSX.Flashback was generating money for its authors by displaying advertisements on compromised computers. We now have a much clearer idea of how many ads the attackers were displaying and how much those ads […]

Read more ...

According to a Wired report, malware has infected the control systems used by the United States Air Force to fly Predator and Reaper drones, logging keypresses as the unmanned aircraft are flown remotely in Afghanistan, Libya, Pakistan and other conflict zones. The malware intrusion is said to have been detected by the Department of Defense’s […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments