The Latest in IT Security

Posts Tagged ‘graphs’

Thanks to Leigh Honeywell I noticed a series of Tweets by Microsoft’s John Lambert. Aside from affirming the importance of security team members over tools, I didn’t have a strong reaction to the list — until I read Tweets nine and ten. Nine said the following: 9. If you shame attack research, you misjudge its […]

Read more ...

In August, Doctor Web specialists analysed a myriad of new malware. At the beginning of the month, they discovered a malicious program that compromised sites making use of popular CMSs. In the second half of August, a Trojan-Spy was found that represents a serious risk to Linux machines. Viruses According to the statistical information collected […]

Read more ...

In a recent post, AppAppeal ranked the most popular URL shorteners. The top five includes TinyURL, Goo.gl, Bit.ly, Ow.ly and is.gd. Unfortunately, these helpful services are also used to hide a large number of malicious URLs. This result has made me want to learn more about malicious links that may be hidden behind these shortcuts.For […]

Read more ...

Categories

SUNDAY, AUGUST 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks