The Latest in IT Security

Posts Tagged ‘eight months’

As I mentioned in a post last week, there was an interesting malvertising component involved as one of the “prongs” of a large malware attack, and it was worth a post of its own. (Any time a big site like the L.A. Times is involved in a malware campaign, it’s newsworthy, and it’s not alone […]

Read more ...

Cybercriminals tend to leverage what’s popular and new. Case in point, the much-anticipated Google Project Glass is being used as a social engineering lure to trick unsuspecting users into scams.We found that one of the top results for the search term “free Google glasses” is an eye-catching YouTube link with the title [{FREE}] Google Project Glass […]

Read more ...


Categories

THURSDAY, OCTOBER 21, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments