The Latest in IT Security

Posts Tagged ‘offerings’

Malware is often embedded in email as compressed attachments (such as .zip, .rar, etc.). Recently, however, Symantec has noticed an increase in malicious email attacks with .htm (HTML) attachments. Here is what the message looks like in your inbox: The attack contains a .htm attachment and obfuscated JavaScript is embedded in the coding of the […]

Read more ...

01
Sep
2011

Picture this news story: “42 suspects in three countries were arrested today in connection with the attempted theft of intellectual property from XYZ Corp.  XYZ Corp. worked with law enforcement in each country in order to identify and apprehend the would-be thieves. The Attackers were caught due to flaws in the implementation of their attack, […]

Read more ...

Back at the end of March, Amazon got the jump on the competition when it launched the Cloud Drive remote data storage service and associated music-streaming Cloud Player. Apple and Google are both working on similar offerings, but Amazon got there first. The launch wasn’t perfect, with Sony making a stink over Amazon not securing […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments