The Latest in IT Security

Posts Tagged ‘host names’

APT is gaining much more press attention recently with RSA and Northrup Gruman intrusions making it into the news. A set of researchers from Taiwan presented their APT related data at “Balancing the pwn Trade Deficit”. Based on a known APT malware set, they developed methods for clustering the malware to identify and make sense […]

Read more ...

[A lot of travel recently has pre-empted work on the blog. Here is a cool post from Tim in our internal team blog a couple of weeks ago. I’ve been pestering him to do another in our "visualizing malware" series… –C.L.] As we have seen before (More Malicious Ads, Visualizing Malware Networks), malvertising enables the […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments