The Latest in IT Security

Posts Tagged ‘interaction’

Today we announce that the Beta for the next version of Microsoft Security Essentials is open for registration.   Do you want to try out our latest innovations in protection and performance? Are you interested in helping to improve Security Essentials?   The number of users than can participate in the Beta is limited, so […]

Read more ...

In the first part of this series, we discussed the entry points that an intruder could use to attack our “building,” our metaphor for network security. In the next few posts, we shall focus on the next level: attack vectors. If vulnerabilities are the entry points, then attack vectors are the ways attackers can launch […]

Read more ...

The MySQL.com website has been struck by cybercriminals, who hacked their way in to serve up malicious code to visiting computers. Simply visiting the home page of the website, initiated a Java exploit that downloaded and executed malicious code on visiting Windows computers. No user interaction was required for PCs to become infected. The hack […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments