The Latest in IT Security

Posts Tagged ‘conclusions’

This looks like it could be a new series of blog posts. The infamous redspacetube.com (80.91.176.192) shows yet another payload using a more sophisticated technique. I’ve been monitoring the situation closely and observed a change in today’s malware behaviour. The previous payload was the XP Home Security 2012 rogue which created a randomly named file […]

Read more ...

I’ve been using Google Plus almost as long as it has been around, which is a sneaky way of saying I am a noob to it Frankly, at this point I do not see anything particularly novel or sensational. I just haven’t seen the killer feature that will vanquish the Facebook megalith, but perhaps I […]

Read more ...

Just a day after the ‘retirement’ of hack-the-world-and-expose-random-people’s-data cyberbreach group LulzSec, and the official announcement is old news. The world is already in a questioning frenzy about what happens next. Sadly, the questions are often of an unanswerable sort: inviting speculation, possibly even wild speculation; or trying to squeeze conclusions from unsupportable, possibly even wildly […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments