The Latest in IT Security

Posts Tagged ‘case study’

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at the […]

Read more ...

Businesses targeted in email scams don’t always have to play the victim. They can actually fight back. Researchers at Dell SecureWorks have documented how they identified a suspected email scammer from Nigeria, by essentially playing along with the scheme to fool the attacker into revealing his true whereabouts. Read More

Read more ...

Bill Hineline had two requirements as he was searching last year for a new tool to keep tabs on the hundreds of interconnected applications that keep United Airline’s planes flying. It had to ensure critical flight operations software was working and it had to meet customers’ demands for accessing information from smartphones and tablets. The […]

Read more ...


Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments