The Latest in IT Security

Posts Tagged ‘Malicious’

Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves from malicious insiders. The effects of insider threats are simply too big to ignore. In the most recent year on record, U.S. […]

Read more ...

Cybercriminals are targeting employees who browse the Web or check their #email from point-of-sale (PoS) computers, a risky but unfortunately common practice. Researchers from #security firm FireEye recently came across a spam campaign that used rogue email messages masquerading as job inquiries. The emails had fake resumes attached that were actually Word documents with an embedded […]

Read more ...

A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X implementation is also in the works. The developers are trying to raise awareness that malware can infect GPUs and that the security […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments