The Latest in IT Security

Posts Tagged ‘legends’

As I wrote in parts one and two of this series of blogs, Java.Cogyeka uses an autorun.inf file to propagate and download an additional module. I was able to get the downloaded module, based on a Java application, even though it took over a week because of the difficulty in establishing a connection with the […]

Read more ...

A new hoax is spreading between Facebook users, in the mistaken belief that sharing a picture of a sick boy in intensive care will grant him a heart transplant. If this little boy gets a 100 shares then he can get his heart transplant for free Of course, the message is nonsense – and simply […]

Read more ...

EVE Online, the popular sci-fi multiplayer online game, is amongst the latest websites to have been attacked by the LulzSec hacking group. In an operation dubbed “Titanic Takeover Tuesday”, LulzSec instigated a distributed denial-of-service (DDoS) attack that swamped EVE Online’s web servers and forced makers CCP Games to take the site completely offline for some […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments