The Latest in IT Security

Posts Tagged ‘malicious programs’

Today, cybercriminals are quick to exploit vulnerabilities in Adobe Reader, Flash and Java to infect users’ computers. There is a simple reason for this popularity: exploits of vulnerabilities found in these products can infect computers regardless of which operating systems and browsers are used on the attacked machines. We assumed that the threats posed to […]

Read more ...

Russian anti-virus company Doctor Web is warning users about the malicious program Trojan.Proxy.23012, which is helping attackers carry out mass spam mailings. This Trojan has a number of features that distinguish it from other malware. Trojan.Proxy.23012 is downloaded to infected computers by other malicious programs such as Trojan.PWS.Panda.2395. The Trojan executable file is compressed with […]

Read more ...

Code sign certificates assure users that any software is not maliciously altered. But what happens if a malicious program uses a legitimately issued certificate?Last week, Adobe released an advisory warning users of malicious utilities carrying legitimate Adobe certificates. According to the advisory, they are currently looking into certain utilities carrying legitimate Adobe-issued certificates. To immediately […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments