The Latest in IT Security

Posts Tagged ‘Blog’

In recent days, we have seen blogs about a specific type of Mass Injection campaign. We take this opportunity to publish our findings in this blog. This particular campaign has already picked up pace and it is infecting a lot of innocent users out there. It all starts with a script that is injected into […]

Read more ...

Our investigation and research of Duqu malware continues. In our previous report, we made two points: – there are more drivers than it was previously thought; – it is possible that there are additional modules. Besides those key points, we concluded that unlike the massive Stuxnet infections, Duqu attacks and is contained within an extremely […]

Read more ...

We’re now regularly seeing Twitter accounts which have fallen into the hands of cybercriminals, sending out messages to their their online friends with the aim of tricking them into handing over their all-important username and password. Here’s one of the latest attacks, shared with us by our friends at @TweetSmarter: Found a funny picture of […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments