The Latest in IT Security

Posts Tagged ‘Blog’

One of the things we try to keep an eye out for is a new malware binary that is poorly detected by other methods, since it helps us show that there is real value in the non-traditional detection techniques used in WebPulse. A couple of weeks ago, we rolled out an important update to one […]

Read more ...

Hot on the heels of recent action taken by Tumblr to combat spammers, Tumblr users are currently a little bit annoyed by a curious spamrun called “The Twitter IQ Society”. Spam accounts are popping up all over the place that have no actual Tumblr blog to speak of; their homepage is merely a collection of […]

Read more ...

[A lot of travel recently has pre-empted work on the blog. Here is a cool post from Tim in our internal team blog a couple of weeks ago. I’ve been pestering him to do another in our "visualizing malware" series… –C.L.] As we have seen before (More Malicious Ads, Visualizing Malware Networks), malvertising enables the […]

Read more ...


Categories

TUESDAY, MARCH 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments