The Latest in IT Security

Posts Tagged ‘Blog’

The Spam Analysis blog has an excellent post analysing what is happening behind the scenes in the malware from some recent spam runs. I’ve taken their hard work and have broken out the domains and IP addresses that you may want to block. Note that some of these sites may be legitimate hacked sites. Also […]

Read more ...

In all of our earlier blogs about the Android threats, we have highlighted the fact that user awareness is one of the most important factors to fight against the social engineering threats. Yesterday, a familiar Android threat was making news powered by a sound social engineering trick.  This blog looks at the differences/similarities of the […]

Read more ...

If you or any of your friends play Zynga games on Facebook, then you have likely seen the following warning circulating: WARNING to all: If you get an Adobe Flash Player Update message that pops up when you click on Zynga games (mafia, farm, poker HC etc) – DO NOT RUN IT….it is could be […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments