The Latest in IT Security

Posts Tagged ‘death ray’

20
Jul
2011

For a malware researcher, getting an e-mail from a family member, friend, or co-worker about something fishy they found in their in-box is just like getting a tiny little Christmas present. It’s always fun to do a quick investigation and report back. A few days ago, I got such an e-mail from a fellow Blue […]

Read more ...

One of the (few) blessings of having been so long in this industry is that I remember a time when most malware was viral and Trojans were rare: so rare, in fact, that there was at one time a notorious "dirty dozen" set of Trojans.  At around the same time, there were innumerable hoaxes describing malware with […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments