The Latest in IT Security

Posts Tagged ‘malicious user’

Most devices nowadays, like printers, scanners and VoIP systems, have embedded web servers for easy administration. Unfortunately, many of these devices are mostly unprotected due to lapses in configuration. Some servers are not configured properly (can be accessed using the default user name and password), or are left with no means of protection. What’s worse […]

Read more ...

Last week, there was ample coverage on the data breach on SK Comms, one of the popular service providers in South Korea that offers three types of service-social networking and instant-messaging (IM), as well as mobile phones. The breach affected user accounts of Nate portal and Cyworld, both under SK Comms.Within the same week, we […]

Read more ...

SpyEye is now very well known within all security communities and security blogs of the world.The latest version of the SpyEye tool includes very powerful capabilities, specifically designed to steal sensitive data from Windows users conducting monetary transactions over the Internet. The Trojan tool is sold on the underground market and in cybercrime forums to […]

Read more ...


Categories

FRIDAY, MAY 10, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments