The Latest in IT Security

Posts Tagged ‘home users’

This month brings some interesting updates from the Microsoft central security team’s regular notification service for December 11 2012. The Microsoft Security Bulletin Notification for December 2012 contains seven bulletins; with five of then listed as “critical” and two ranking as “important” overall. In Bulletin 1 we see a risk of “remote code execution” affecting […]

Read more ...

In the last few days we’ve seen this fake fax email doing the rounds, offering up a “2013 recruitment plan”: Click to Enlarge The email reads as follows: ********************************************************* INCOMING FAX REPORT ********************************************************* Date/Time: 09/28/2012 07:01:41 AM Speed: 14400 bps Connection time: 01:02 Pages: 2 Resolution: Normal Remote ID: 0420950504 Line number: 2 DTMF/DID: Description: […]

Read more ...

The Fbi’s “Operation Ghost Click” announcement in Nov 2011, involving the Rove Digital botnet delayed cleanup efforts that we previously discussed, continues to haunt both the internet networks and the mass media. A Forbes article and a Times article yesterday brought the apparition back to the front, with some claiming that the site offered by […]

Read more ...


Categories

MONDAY, MAY 06, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments