The Latest in IT Security

Posts Tagged ‘blogpost’

Earlier today, Softpedia reported that an Algerian hacker using the nickname MCA-CRB has managed to deface the Romanian sites of Google (google.ro) and Yahoo! (yahoo.ro). Screenshot of the defaced Google.ro domainWhen we found out about this incident we were pretty skeptical of these websites being hacked. A website as large as Google can be hacked, […]

Read more ...

We were alerted to this from a customer reporting that Zscaler was blocking pages on www.computerworldmexico.mx And as evidence of this, was our Zulu report – which when we looked at it showed that the page itself did not have any malicious content / reason But the site’s own internal JS files were being flagged as […]

Read more ...

In our earlier blogs, we have highlighted how Android Malware authors are quickly adopting various tricks from the age-old and vast pool of desktop Malware tricks. In this blogpost, we will talk about one such trick which is an adoption from desktop malware. While processing a recent bunch of malware collections, we have noticed heavy […]

Read more ...


Categories

WEDNESDAY, MAY 08, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments