The Latest in IT Security

Posts Tagged ‘Blog’

Now that MEGA has launched (albeit a little shakily), it hasn’t taken long to spot what may be the first scam trying to make some money off the back of the brand new file hosting service. Click to Enlarge “Hack! Search and download files from mega.co.nz for free”, the YouTube video claims (while linking no […]

Read more ...

Today, let’s get our hands dirty by analyzing an “interesting” sample that I found in-the-wild earlier today. There are multiple interesting parts of this sample; the first one is that they don’t really hide/obfuscate their stuff. They left it in plain text, and exposed the contents of their server. (By accident, I think.)Let’s move to […]

Read more ...

As mentioned in our previous post, there’s an Internet Explorer (zero-day) remote code execution vulnerability being exploited in the wild which affects IE 8, as well as IE 6 & 7. Those versions of IE account for about one third of all desktop browser market share.Current exploitation is limited but it’s quite likely a reliable […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments