The Latest in IT Security

Posts Tagged ‘exploits’

We are monitoring a spam campaign that is using the names of delivery services like FedEx and DHL to send the receiver to a website that installs malware. With subjects like “Not possible to make delivery” or “Shipping service”, the emails make heavy use of social engineering by creating a sense of emergency in order […]

Read more ...

The corporate environment is more complicated than home one. There are a number of file servers and many tens to thousands client computers. An antivirus is usually installed on all those machines. In most cases it detects the malware that attacks a company, however there could be cases when malware outsmarts the antivirus , then […]

Read more ...

Malware authors are notorious for quickly leveraging new exploits in the public domain for nefarious purposes. The recent discovery of a Linux Kernel CVE-2013-2094 Local Privilege Escalation Vulnerability (CVE-2013-2094) in the Performance Counters for Linux (PCL)-currently being exploited on various platforms-has now been modified to work on the Android operating system.  For anyone unfamiliar with […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments