The Latest in IT Security

Posts Tagged ‘Blog’

In July 2012, our virus laboratory came across what we first thought was a new family of malware. The threat spread by infecting Portable Executable or PE files used by Windows, but this malware also infected systems through remote desktop and network shares. After further analysis, we realized we were dealing with a new version […]

Read more ...

eBay! Man, I’ve bought some weird things. Apparently I can’t leave the blog at that, so you may want to be aware that not only have eBay updated their logo for the first time since 1995, some scammers have also been quick out of the blocks to rejig their phishing scams and paste in the […]

Read more ...

On Tuesday, we shared a rather silly video which made a serious point about the need to keep websites secure. Unfortunately, limiting potential website vulnerabilities is not exactly intuitive. There’s always additonal stuff one needs to consider. For example, let’s take the very popular WordPress(.org) publishing platform. WordPress itself does a pretty good job when […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments