The Latest in IT Security

Posts Tagged ‘Computer security researchers’

An intensification of cyber attacks in Syria has been observed as security researchers find remote access Trojans (RAT) being delivered through activist websites and social networking pages relating to the political conflict in the area, to individuals seeking news or tools for ensuring private communication. The most prevalent RATs malware operators rely on are ShadowTech, […]

Read more ...

Security researchers have found a new strain of the Cridex banking malware, one that relies on HTML injections very similar to Gameover Zeus (GOZ), making it more sophisticated and efficient. Cridex, also known as Bugat, Feodo, and Geodo, does not rely on a peer-to-peer (P2P) infrastructure for communicating with the command and control servers and […]

Read more ...

Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments