The Latest in IT Security

Posts Tagged ‘2f’

Ransomware has become a popular way for the bad guys to extort money from users. It is usually installed by drive-by exploit kits such as Blackhole and Cool.  After a user is infected, his machine is made inoperative and he will see a warning screen that claims child porn, copyright material, unlicensed software and malware […]

Read more ...

Just recently, I logged on to my Facebook account and saw that a couple of people on my Friends list had posted something about a free $250 gift card from Costco, similar to this: When you click the link, Facebook asks you if you’re sure that the link is not spam. If you choose “not […]

Read more ...

This week, the AVG MobilationT research team found a new instance of PUP (Potentially Unwanted Program) named ‘FakeLottery’ in the Android market. Fortunately, after our Security research team reported this to Google. They suspended the developer for violating the Android Market Developer Distribution Agreement.Developer name in the market: “Asta E services”Below you can see a picture […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks