The Latest in IT Security

Posts Tagged ‘Acrobat’

Phony LinkedIn invitations are not a new phenomenon. What tends to change is the underlying delivery method used for the malware distribution – In this case compromised websites that unknowingly host malicious scripts. The LinkedIn reminders that are included in the attack include several variables such as names, relationships, and the number of messages awaiting […]

Read more ...

While the United States enjoyed a long Thanksgiving weekend, hackers continued to battle Web security. Fortunately, the automated WebsenseR ThreatSeekerR Network and staff elsewhere in the world ensured that systems and data stayed safe. Websense researchers working over the holidays identified emerging threats hijacking the holiday spirit. Over 40% of 170 popular Thanksgiving-related search terms had […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments