The Latest in IT Security

Posts Tagged ‘rcw’

Ransomware has become a popular way for the bad guys to extort money from users. It is usually installed by drive-by exploit kits such as Blackhole and Cool.  After a user is infected, his machine is made inoperative and he will see a warning screen that claims child porn, copyright material, unlicensed software and malware […]

Read more ...

This week, the AVG MobilationT research team found a new instance of PUP (Potentially Unwanted Program) named ‘FakeLottery’ in the Android market. Fortunately, after our Security research team reported this to Google. They suspended the developer for violating the Android Market Developer Distribution Agreement.Developer name in the market: “Asta E services”Below you can see a picture […]

Read more ...


Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments