The Latest in IT Security

Posts Tagged ‘blogged’

It's been a while since we looked at the Android malware space (I think the last one was here), so when someone asked about it yesterday, I pulled up some log traffic to take a look. It looks like Russia and China continue to be hotbeds for unofficial app download sites, where you're definitely taking […]

Read more ...

My spam honeypots yesterday yielded a nice example of a spam attack being used to lure people to servers hosting the infamous Blackhole exploit kit, which we've blogged about several times in the last six months or so. The spam arrived the evening before. Here's how it looked: Clicking on one of the links took […]

Read more ...

Time for a quick blog post on an attack we've been following for several weeks now. I've seen a few news articles and blog posts that could be describing it, at least in general terms (i.e., hacked WordPress sites redirecting victims to Fake AV malware sites), so let's flesh it out a bit. (It's also […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks