The Latest in IT Security

Posts Tagged ‘dragon’

A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to our laptop, facebook, gmail, linkedin and many more similar accounts. Choosing “password” as your online password is not a good idea. It’s the worst password you can possibly choose, as it is easy […]

Read more ...

With web malware exploitation kits, continuing to represent the attack method of choice for the majority of cybercriminals thanks to the overall susceptibility of end and enterprise users to client-side exploitation attacks, it’s always worth taking a peek inside them from the perspective of the malicious attacker. In this post, we’ll take a peek inside […]

Read more ...

The TDSS botnet, now in its 4th generation, is seriously sophisticated malware, which is why we’ve spent so much time writing about it: the revision of the paper The Evolution of TDL: Conquering x64 that will be up on the white papers page shortly runs to 54 pages and includes some highly technical analysis, including the detail on […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments