The Latest in IT Security

Detected by Trend Micro products as Trojan.MacOS.GMERA, the software poses as the Mac-based trading app Stockfolio, but contains shell scripts that allow it to perform malicious activities. To date, two malware samples were discovered, revealing an evolution of the threat. The first sample is a ZIP archive file containing an app bundle (Stockfoli.app) and a […]

Read more ...

Anne Neuberger, director of the newly formed Cybersecurity Directorate at the National Security Agency (NSA), on Wednesday pointed to ransomware attacks as a key danger to the 2020 elections. “Ransomware is really interesting — 4,000 attacks a day over the last number of years. … That is certainly something that would be a key concern […]

Read more ...

  The security hole, tracked as CVE-2019-0604, got its first patch in February and another one in March after the first fix turned out to be incomplete. Microsoft described the issue as a remote code execution vulnerability caused by the software’s failure to check the source markup of an application package. It can be exploited […]

Read more ...


Categories

FRIDAY, DECEMBER 13, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments