The Latest in IT Security

Posts Tagged ‘Forensics’

The Israeli government paid a visit on Wednesday to NSO Group, the controversial company whose spyware has been alleged to have been covertly installed on the mobile devices of journalists and activists. Officials from Israel’s Ministry of Defense visited NSO Group, according to The visit was pre-arranged, the publication reported, and it did not […]

Read more ...

Year: 2015 Number of customers breached: 2.4 million (90,000 credit card numbers) Brands affected: TalkTalk #mobile, Talk Mobile,, #data taken: not credit card numbers but names, addresses, dates of birth Was it sophisticated? The word has become meaningless. All breaches are now described that way Period of breach: around two weeks to 5 […]

Read more ...

Last week, our friends at Sucuri sent us a modified version of an Apache webserver redirecting some of its requests to the infamous Blackhole exploit packs. Sucuri has published a blog post on this attack. Our analysis of this malware, dubbed Linux/Cdorked.A, reveals that it is a sophisticated and stealthy backdoor meant to drive traffic […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments