The Latest in IT Security

Posts Tagged ‘honeypot.’

Raspberry Pi (R-Pi) computers are cheap and versatile enough to be used for creating an army of honeypots that could help businesses detect attacks or assess different methods cybercriminals could leverage to penetrate their systems.Nathan Yee, a software engineering intern at ThreatStream, a company that gathers threat intelligence, has built a honeypot network out of […]

Read more ...

An interesting malware attack showed up in two of my honeypots one morning this week. I then received a third copy from a co-worker later that morning, so I did a little research to gather enough data for a blog post. The e-mails are interesting, since they purport to be simple bills or invoices (“pending […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments