The Latest in IT Security

Posts Tagged ‘definitions.’

Whether a Montague or a Capulet, it never mattered to Juliet, as she made the case in Shakespeare’s “Romeo and Juliet” when she says one of her most famous lines, “What’s in a name? That which we call a rose by any other name would smell as sweet.”Earlier this week, we wrote about the increase […]

Read more ...

On September 27, Adobe posted a blog stating that the company is investigating the inappropriate use of an Adobe code signing certificate for the Windows operating system.  Symantec is aware of this issue and has added protection to detect any unauthorized file signed by the Adobe certificate in question as Trojan.Abe. We are currently aware […]

Read more ...

Introduction to Threat Encyclopedia The Threat Encyclopedia is where we arm you with all the knowledge you need to understand and avoid malware of all types. This isn’t an in-depth analysis of malware code but instead covers the basics and helps you understand what antivirus programs like AVG protect you from. Blackhole Exploit Kits: What […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments