The Latest in IT Security

Posts Tagged ‘Chains’

Another item in the post-vacation queue for the blog is an update on the big Fake AV attack we posted about at the beginning of the month. From last Friday's logs, I pulled data on one sample server. Here's what it had been up to: – 2400+ URLs in the week from 4/13 (when it […]

Read more ...

At the start of 2011, blackhat SEO was very much alive and kicking, and was being aggressively used to infect users with malware [1 ,2]. By May 2011, our detection for the malicious redirect used in these attacks, Mal/SEORed, was dominating our threat stats. Note: For readers that want a a quick recap on how […]

Read more ...

Members of the Koobface malware gang might be feeling a little hot under the collar as evidence has begun to spill onto the internet about the alleged identity of one of its members. The Koobface botnet has been terrorising millions of internet users since mid 2008, and much investigation has taken place into how the […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments