The Latest in IT Security

Posts Tagged ‘attr’

20
Jun
2011

So, a (long) while ago I wrote about the Haiti earthquake, with some commentary about the intersection between natural disasters, Black Hat SEO, scare tactics for education in good security practice, plus some links relevant to the earthquake. Well, I'm certainly not ashamed of that blog, though I haven't thought about it for a long time, […]

Read more ...

14
Jun
2011

@RedNose commented on the blog I put up recently about the tool my Russian colleagues have made available for dumping TDL’s hidden file system: I’m going to respond here in case anyone else is confused about this.“I ran the tool and it did not show anything. Does it mean that TDSS is not present?”No, that’s […]

Read more ...

13
Jun
2011

In fact, the main point of the article I just sent up to SC Magazine's Cybercrime Corner, "Stuxnet: Paradigms Lost and Paradise Regained" is that the 'next Stuxnet' probably won't be any such thing, whatever we may choose to call it. Stuxnet was certainly a warning, but the message is a bit less dramatic than […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments