The Latest in IT Security

Posts Tagged ‘Computer security researchers’

More sophisticated threats rely on various techniques not just to avoid antivirus detection but also to prevent security researchers from taking a closer look at their inner mechanisms.Analyzing malware is generally done in virtual spaces (sandbox utility or virtual machines), which are isolated environments designed to contain all the modifications to themselves and do not […]

Read more ...

Security researchers at FireEye claim the majority of the most popular free Android apps are susceptible to Man-In-The-Middle (MITM) attacks.

Read more ...

An active phishing campaign that is probably targeting Australian users has been spotted by security researchers to drop a new type of ransomware, which contains elements from CryptoLocker and CryptoWall but with a totally different underlying code. Dubbed TorrentLocker, the fresh ransomware proceeds to encrypt specific files on the affected computer and then displays a […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments