The Latest in IT Security

Posts Tagged ‘Exploit’

Ransomware has become a popular way for the bad guys to extort money from users. It is usually installed by drive-by exploit kits such as Blackhole and Cool.  After a user is infected, his machine is made inoperative and he will see a warning screen that claims child porn, copyright material, unlicensed software and malware […]

Read more ...

Necurs is a prevalent threat in the wild at the moment – variants of Necurs were reported on 83,427 unique machines during the month of November 2012. Necurs is mostly distributed by drive-by download. This means that you might be silently infected by Necurs when you visit websites that have been compromised by exploit kits such as Blackhole. So […]

Read more ...


Categories

MONDAY, MARCH 31, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments