The Latest in IT Security

1

I just got an e-mail from the World Health Organization (WHO) asking for a donation to help fight coronavirus. It looked good. It sounded good. It was a fake. Asking for a donation in Bitcoin set off my alarm. Anytime, anyone asks you for Bitcoin in an email they’re trying to scam you. We may […]

Read more ...

1

Hackers have started scanning the Internet for Microsoft Exchange Server instances that are affected by a remote code execution vulnerability patched earlier this month. Tracked as CVE-2020-0688, the security flaw exists when the server fails to properly create unique cryptographic keys at the time of installation. The issue resides in the Exchange Control Panel (ECP) […]

Read more ...

1

Hackers who unleashed DDoS attacks (Distributed Denial of Service) attacks on a state-level voter registration and voter information website in the US used a technique called Pseudo Random Subdomain Attack (PRSD,) which is a form of attack that uses DNS queries for nonexistent and randomized subdomains, according to the FBI. “The FBI received reporting indicating […]

Read more ...


Categories

TUESDAY, APRIL 07, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments