The Latest in IT Security

Posts Tagged ‘magnitude’

A few weeks ago, Iran reported intensified cyber attacks on its energy sector, which they observed as a direct continuation of the Stuxnet and Duqu attacks.Over the weekend, the IR Cert (Iran’s emergency response team) published a new report, which describes this attack as “Flame” and/or “Flamer”. Some other news agencies also reported the attack […]

Read more ...

Further analysis of the OSX.Flashback botnet has shed more light on how profitable such a botnet can be. Previously, we wrote that OSX.Flashback was generating money for its authors by displaying advertisements on compromised computers. We now have a much clearer idea of how many ads the attackers were displaying and how much those ads […]

Read more ...

02
Mar
2012

When we upload something embarrassing about ourselves to, let?s say Facebook, that?s completely our fault. But there are other subtle ways to get information about us. Let?s say a few words about tracking. Every time you visit a website you request HTML that will be rendered in your local browser. This code may include external […]

Read more ...


Categories

SATURDAY, APRIL 27, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments