The Latest in IT Security

Posts Tagged ‘map’

Someone somewhere is trying hard. The “someone” is a cybercriminal or organization, and since the 8th of August they have been trying hard to infect millions of computers worldwide. The purpose of this vast computing force is still not clear. The attacks of the last month have made extensive use of email-attached malware, resulting in […]

Read more ...

Since its appearance in September 2010, Black Hole Exploits Kit had a very positive insight into the criminal environment. Their life cycle is not over yet so it has developed a natural evolution, and so far there are three generations that exist “in the wild”.Black Hole Exploits Kit was developed by who is known under […]

Read more ...

We are currently investigating a new malicious campaign on Facebook mostly targeting French-speaking users. When visiting infected users’ profiles, you see the following: Translation: Wow, it really works! Find out who is viewing your profile! The various links that are used rotate quite fast and lead unwitting victims to a website that explains what they […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments