The Latest in IT Security

Trojans Installed on Computers of Poker Players Give the Attackers an Edge

11
Dec
2013

Similar to high-profile business managers, who are targeted in cyberattacks known as Whaling attacks, professional poker players are targeted with Sharking attacks. A perfect example is provided by researchers from F-Secure.

The Finland-based IT security firm has been visited by Jens Kyl…

Comments are closed.

Categories

TUESDAY, AUGUST 11, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments