The Latest in IT Security

Posts Tagged ‘logs’

Background: Spamnet Tracking A year or so ago, as we were talking about malnets one day, it occurred to us that there was probably a lot of similarity between the networks run by the Bad Guys to infect victims with malware, and the networks used by spammers to run their spam campaigns. In fact, we […]

Read more ...

A new Trojan has been discovered –DarkAngle– that steals users’ confirmation information like passwords, banking details, etc. Nothing unusual about this, just one more to add to the more than 73,000 new viruses that appear every day. However, there is something truly special about this new piece of malware… It tries to pass itself off […]

Read more ...

One nice thing about having lots of traffic flowing through WebPulse, and having lots of modules watching for malicious and suspicious activity, is that it's always easy to find an interesting topic for the blog. (The tricky part is finding time to follow a lead, do the background research, and write the blog post. I […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments