The Latest in IT Security

Posts Tagged ‘mass mailing’

How easy is it for bad guys to buy valid digital certificates from CAs using fake data and then start signing Trojan bankers with them? In Brazil it appears to be very easy. Today most software developers digitally sign their programs. The process involves Certification Authorities (CAs) that must verify the authenticity of the files […]

Read more ...

As we are all aware, Adobe released security updates for Adobe Flash Player 11.3.300.270 and earlier versions for Windows, Macintosh, and Linux. These security updates address the Adobe Flash Player CVE-2012-1535 Remote Code Execution Vulnerability that could cause the application to crash and potentially allow an attacker to take control of the compromised computer. Adobe […]

Read more ...

The first spring month in 2012 was unusually “hot” with the emergence of a whole series of new threats to Windows and other platforms. In particular, attackers came up with another way to spread Trojans for Mac OS X, and new malicious applications for Android were discovered. In early March, immediately following the Russian presidential […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments