The Latest in IT Security

Posts Tagged ‘phenomena’

Editor’s note: This is guest post by Craig from ThatsNonsense.com. If you’ve devoted any significant time to social networking giant Facebook, you’ve more than likely spent most of your time perusing and tagging photos, chatting with mates, joining Fan pages, finding old friends or even making new ones.Oh, and you’ve also probably witnessed or participated in […]

Read more ...

Symantec has discovered a Trojanized version of a legitimate application that is part threat part doomsayer. The threat was embedded in a pirated version of an app called ‘Holy ***king Bible’, which itself has stirred controversy on multiple forums where the app is in circulation. Once the threat is installed, it waits for the device […]

Read more ...


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments