The Latest in IT Security

Posts Tagged ‘borders’

On Friday, the Canadian government was expected to submit an application to the UN Commission tasked with evaluating which countries can claim exclusive rights to resources — namely oil and gas — found in waterways far beyond their borders. Instead, however, the country made a surprising pivot: at the insistence of Prime Minister Stephen Harper, they […]

Read more ...

When it comes to innovation, cyber-criminals have no borders, or that’s what we believe after analyzing this piece of multi-language malware detected as Trojan.Ransom.IcePol.

Read more ...

These two spam campaigns lead to malware on Date:      Mon, 5 Nov 2012 12:54:44 +0530From:      Declan Benjamin via LinkedIn [[email protected]]Subject:      Wire Transfer Confirmation (FED 27845UL095) Good afternoon, Your Wire Transfer Amount: USD 85,714.01 Wire Transfer Report: View ELOISA STRICKLAND, The Federal Reserve Wire Network ============== From: [email protected] [mailto:[email protected]] Sent: 05 November […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments