The Latest in IT Security

Posts Tagged ‘cyber-attackers’

Cyberthieves today know that it’s better to be sneaky and crafty than forceful. To be even more blunt, they know that it’s better to trick you into doing their work than to break in and do it themselves. That trickery starts with ever-more-subtle ways to get you to click on an email attachment. A recent […]

Read more ...

Ransomware criminals chatting up victims, offering to delay deadlines, showing how to obtain Bitcoin, dispensing the kind of customer support that consumers lust for from their cable and mobile plan providers, PC and software makers? What’s not to love? Finnish security vendor F-Secure yesterday released 34 pages of transcripts from the group chat used by […]

Read more ...

  A researcher from Chinese security firm Qihoo 360 has revealed details on a vulnerability in 4G LTE networks that, if exploited, could allow hackers to use fake, malicious base stations to perform man-in-the-middle attacks. According to The Register, researcher Wanqiao Zhang presented her findings on the vulnerabilities last weekend at the Ruxcon Security Conference […]

Read more ...


Categories

TUESDAY, JUNE 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments