The Latest in IT Security

Posts Tagged ‘logic’

Imagine my surprise this morning when I received an email from the second wife of Muammar Gaddafi, Safia Farkash al-Baraasi! I suppose I wasn’t really surprised, as every time there is a major news event, tragedy or television spectacle, spammers and fraudsters use the topic to social engineer their victims. The message itself was quite […]

Read more ...

The first version of ZeuS-in-the-Mobile (ZitMo), malware which targets mTANs, was discovered in the end of September 2010. In that case it was targeting Symbian smartphones. Later on, ZitMo versions for Windows Mobile and Blackberry were found. It comes as no surprise that cybercriminals have created new and sophisticated pieces of mobile malware for Symbian […]

Read more ...

There have been several stories of students getting sanctioned by their schools because of something they posted on Facebook. But has anyone ever asked how exactly these schools find out about the posts? One would think that information about the controversial posts are just passed along the grapevine until it reaches the ears of school […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments