The Latest in IT Security

1

The growing sophistication of tools and techniques for protecting people against phishing scams is forcing attackers to adapt and evolve their methods. A Microsoft analysis of data collected from users of its products and services between January 2018 and the end of December showed phishing was the top attack vector for yet another year. The […]

Read more ...

1

A group of Turkish-speaking hackers is hijacking popular Instagram profiles, including those belonging to actors and singers, and, in some cases, promising to turn back control to the victims in exchange for a ransom or nude photos and videos. Researchers from Trend Micro say they have recently observed several incidents where the group has been […]

Read more ...

1

Cyber thieves are ramping up their use of malicious codes on e-commerce sites as a way to steal credit card information from consumers, according to a report released Wednesday. Symantec’s annual Internet Security Threat Report said that in 2018 hackers turned to what’s known as “formjacking” in order to “steal credit card details and other […]

Read more ...

Categories

THURSDAY, APRIL 25, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks