The Latest in IT Security

Posts Tagged ‘cipher’

Strong encryption can be a double-edged sword. It is obviously an essential mechanism for protecting data – e.g., payment card details, passwords, sensitive files, etc. – that is in transit across networks or even at rest in databases. On the other hand, the precise mechanism that it utilizes to shield all of this valuable information […]

Read more ...

On June 26, we observed an exploit kit attack on the Segway website. Symantec has notified Segway about the attack and Segway has since taken steps to ensure their website is no longer compromised. This blog will look at the details of an attack using the Redkit exploit kit.Attack detailsCode is injected into a jQuery […]

Read more ...

When the mastermind hackers of the notorious Carberp Banking Trojan were arrested, we thought the story had ended. But a sample that we received on May 7th, a  month after the arrests, looked very suspicious. It connected to a well known URL pattern and it really was the Carberp Trojan. Moreover, the domain it connected […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments