The Latest in IT Security

Posts Tagged ‘malicious activities’

Detected by Trend Micro products as Trojan.MacOS.GMERA, the software poses as the Mac-based trading app Stockfolio, but contains shell scripts that allow it to perform malicious activities. To date, two malware samples were discovered, revealing an evolution of the threat. The first sample is a ZIP archive file containing an app bundle ( and a […]

Read more ...

US president Barack Obama has signed on Wednesday a new executive order aimed at imposing “sanctions on individuals or entities that engage in malicious cyber-enabled activities that create a significant threat to the national security, foreign policy, or economic health or financial stability of the United States.” “The malicious cyber-enabled activity must have the purpose […]

Read more ...

Malicious cyber-incidents started to record an upward trend, with activity concentrating in Baghdad, Erbil, Basra, and Mosul. Los Angeles-based cyber-threat intelligence firm IntelCrawler reports that the malicious activities within the Iraqi ISP sector have intensified in the last two months and that multiple new botnets have emerged. Attackers rely on dynamic DNS services to communicate […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments