The Latest in IT Security

Posts Tagged ‘Attackers’

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for a modern piece of malware. […]

Read more ...

From the arrest of one of the head members of the ransomware gang to the successful Rove Digital takedown, coordination between law enforcement agencies and security groups has time and again yielded positive results. This time, the Taiwan Criminal Investigation Bureau (CIB), in cooperation with Trend Micro, resolved a targeted attack involving the notorious Ghost RAT […]

Read more ...

The time between discovery of a vulnerability and the emergence of an exploit keeps getting shorter-sometimes a matter of only hours. This increases pressure on IT managers to rapidly patch production systems in conflict with configuration management and best practices for quality assurance. Many organizations struggle to keep up with the constant release of new […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments