The Latest in IT Security

Posts Tagged ‘Checker’

Normally, the WebPulse team doesn’t bother with questions like “What countries are involved in malware attack A?” or “What malware should people in country B worry about?” Our primary focus is on finding malware attacks and blocking them for ALL our users, since no one wants malware on their network, regardless of where it comes […]

Read more ...

20
Jul
2011

For a malware researcher, getting an e-mail from a family member, friend, or co-worker about something fishy they found in their in-box is just like getting a tiny little Christmas present. It’s always fun to do a quick investigation and report back. A few days ago, I got such an e-mail from a fellow Blue […]

Read more ...

This past weekend a couple of spam-based malware attacks caught my attention: I was alerted to the first one via one of my favorite security blogs: Gary Warner’s Cybercrime and Doing Time. (Although his posts have decreased in frequency this year, they’re well worth reading when they do come out.) He largely focuses on spam, […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments