The Latest in IT Security

Posts Tagged ‘Blog’

16
May
2011

Ah, Tumblr. It calls itself a microblogging site but it’s not exactly like Twitter, nor is it a Facebook or a YouTube. It does a little bit of all three, actually, and for many Tumblr is in a league of its own. What makes this site so awesome is its Reblog feature, where it allows […]

Read more ...

The use of search engine optimisation (SEO) in malware distribution has been discussed many times on this blog. In most cases, the attacks are used to redirect unsuspecting users to scareware (fake anti-virus) sites, where they are tricked into installing fake AV. The attacks have historically been Windows-specific, but recently we have seen the attackers […]

Read more ...

Google just updated the Chrome web browser to version 11.0.696.68. The new release fixes at least two security vulnerabilities. The article from the Google Chrome Release Blog with details about the changes disappeared again unfortunately. Additionally, the integrated Flash Player has been updated to version 10.3. Whether this fixes the vulnerabilities the security service provider […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments