The Latest in IT Security

Posts Tagged ‘meta’

Be wary of emails claiming to be from Facebook, and saying that you have been tagged in a photograph.Because it might be that you’re the next potential victim of a malware attack.SophosLabs has intercepted a spammed-out email campaign, designed to infect recipients’ computers with malware.Here is an example of what a typical email can look […]

Read more ...

For quite some time, we have observed the technique of server-side polymorphism being used to infect Windows computers around the world. What this means is that every time a file is downloaded, a unique version of the file is created in order to evade traditional signature-based detection. We are now seeing this same technique being […]

Read more ...

The recently reported malware attacks against Mac users prompted Apple to release a security update. We did an initial analysis on both the FAKEAV for Macs as well as the latest Apple security update in our previous blog entry. I’ve extracted the version of XProtect.plist (Apple’s pattern file) to dig deeper what’s inside. The .PLIST […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks