The Latest in IT Security

Posts Tagged ‘sample database’

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the latest McAfee Threats Report, for the second quarter of 2013, we discuss this topic. The following timeline highlights recent events about this virtual currency. In our report we noted the growing interest in malware Bitcoin miners: malware […]

Read more ...

Code signing certificates are used to authoritatively identify a software publisher and to guarantee that the content the certificate signs has not been tampered with between the time it was signed and the time the user executes it. Unfortunately, we see more and more malware signed using fraudulently obtained or stolen code signing certificates. We […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments