The Latest in IT Security

Posts Tagged ‘graph’

As we are all aware, Adobe released security updates for Adobe Flash Player 11.3.300.270 and earlier versions for Windows, Macintosh, and Linux. These security updates address the Adobe Flash Player CVE-2012-1535 Remote Code Execution Vulnerability that could cause the application to crash and potentially allow an attacker to take control of the compromised computer. Adobe […]

Read more ...

The vast majority of the most popular blacklisted websites contain a piece of malicious JavaScript inline. These sites were mostly hijacked by attackers and the malicious code can usually be linked to the Blackhole exploit kit. Malicious code found on top blacklisted sites I was surprised to find malicious Java applets in second place, having […]

Read more ...

There has been quite a bit of analysis and speculation about the Flamer/SkyWiper threat. As we started to analyze this threat we instantly knew from the very beginning that this is going to be a giant undertaking and potentially very long term. We wanted to pause to help the people we protect visualize the kind […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments