The Latest in IT Security

Posts Tagged ‘all sorts’

Social engineering tactics are vast and varied, and we see all sorts of methods being used on a daily basis by malware authors, in their attempts to compromise your machine. One such method that we see often is malware being distributed as an alluring or enticing link or file, and we know that some users […]

Read more ...

I’m all for a spot of Lovecraftian tentacled horror coming down from the sky and laying waste to all and sundry, but not when that same unfathomable horror is doing the same thing to my PC like in the below example. Click to Enlarge Somebody put a lot of effort into this so-called “Steam Cracker” […]

Read more ...

Recently we noticed spammers abusing Dropbox, a popular cloud-based, file-hosting and synchronization tool, to spread spam. Dropbox accounts have a public folder where files can be placed and made publicly available. This function is useful to spammers, as it effectively turns Dropbox into a free hosting site. Spammers have abused URL shortening and free hosting […]

Read more ...


Categories

MONDAY, MAY 06, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments