The Latest in IT Security

Posts Tagged ‘functionality’

This blog post is based on a joint report by Zscaler and Seculert (their blog post). Researchers from both companies separately identified attacks which used a remote access tool (RAT) malware that apparently targeted defense-related organizations. With joined forces, we analyzed the incidents that we observed and those published in the open-source to identify attack […]

Read more ...

Major file sharing sites have freaked out, closing down or locking their gates to keep out U.S. IP addresses following the FBI’s Megaupload takedown over the weekend. Since Saturday, when the file-sharing company’s founder, Kim Dotcom, was tossed into a New Zealand jail, similar sites have been taking unprecedented steps to avoid a similar fate. […]

Read more ...

How much trust do you put in Apple’s stewardship of the App Store – the online marketplace where you can download apps for your iPhone or iPad? Chances are that you don’t think twice about installing software from the App Store – after all, all the software up there has been verified by “Apple”, right? […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments