The Latest in IT Security

Posts Tagged ‘vectors’

Some people are saying that it is cost-effective to not purchase any security products and just use Linux. Is it safe? It is not true that by using Linux you’re completely safe and you don’t need any security solution at all. It is true though, that Linux is not as targeted as Windows is. Many […]

Read more ...

25
Jul
2013

Today we have a perfect storm of basic attack vectors which inevitably lead victims to a variety of advertising scams including adware executables, parked domains, pay-per-click scams or phishing sites.  First a small list of all of the websites seen to be hosting this threat. 1yahoo.com/ testflightapps.com/ www.find-your-date.org/ www.conmdirect.de/ www.chanuteinsurancepool.net/ translateitonline.com/ compartel.gov.cofacebook.com/ www.autobypass.com/ rerbox.com/ ravelrey.com/ […]

Read more ...

Recently we released the Microsoft Security Intelligence Report volume 14. The report initially presented data showing reduced Java malware detections in Q3 2012 and gaining prevalence in Q4 of 2012. During a later review of the backend data, we found that we were missing some detection counts from our initial calculations. We have revised the […]

Read more ...


Categories

THURSDAY, APRIL 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments