The Latest in IT Security

Posts Tagged ‘impersonation’

An impersonation of the Adobe Flash Player is being used by cyber-criminals to get page likes for various campaigns in just two clicks, then sell them to other customers.

Read more ...

20
Sep
2012

Six months ago, Flashback was attracting a lot of attention from researchers and media due to its wide spread and interesting features. Since then, we have witnessed its operator abandoning control of the botnet by shutting down its latest command and control server. This happened in May this year. The number of infected systems has […]

Read more ...


Categories

THURSDAY, OCTOBER 22, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments