The Latest in IT Security

Posts Tagged ‘logs’

There's a rather large malvertising-driven attack running at the moment, that's attempting to trick people into installing or upgrading a fake version of Java. It looks pretty believable, if you disregard the domain name (tartd.info having no obvious linguistic connection to "Java"): (The fine print at the bottom, if you're having trouble reading it, says […]

Read more ...

LINUX SYSTEM ADMINISTRATOR Posted: 19 August 2013 Company name: SpamExperts BV Location: Bucharest Romania Poster represents: employer Hours: full time Description:Profile: Do you love working in Linux in general, and are you also a fan of Debian and/or Python? Then we are the right company for you! You will work in a small team, some […]

Read more ...

Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an Android app that basically turns a mobile device into a hack-tool capable of stealing information from a connected Windows machine.He managed to find a sample (MD5:283d16309a5a35a13f8fa4c5e1ae01b1) for further investigation. When executed, the sample […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments