The Latest in IT Security

Posts Tagged ‘detailed description’

The programme of the second day of the VB conference was very mixed. In the corporate stream we have seen sessions about MacOSX Malware, Android Malware and various techniques to identify and analyze distributed attacks. In the technical stream there also were many interesting presentations about mobile malware, malware analysis, and two presentations which try […]

Read more ...

We’ve had reports of a new worm in the wild and that generates increased RDP traffic for our users on port 3389. Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable. The worm is detected as Worm:Win32/Morto.A and you can see […]

Read more ...


Categories

SATURDAY, APRIL 27, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments