The Latest in IT Security

Posts Tagged ‘methodology’

Hungarian security firm CrySyS Lab has located the installer for Duqu, which is now well known for its connection to the infamous Stuxnet. The installer arrived via e-mail as a document which then launches an exploit against a zero-day Windows kernel vulnerability. Very heavy stuff… Symantec was given the installer for analysis, and they’ve updated […]

Read more ...

It was going to happen sooner or later… Trusteer reports that an Android variant of Spitmo (SpyEye for mobile) has been discovered. The methodology sounds familiar for those familiar with ZeuS Mitmo and SpyEye Spitmo: infected computers inject a message into targeted netbanks prompting their customers to install software on their phones. Once Spitmo is […]

Read more ...

Yesterday, I read an article that reported how our counterparts at Sophos “slammed Microsoft” over its reported malware blocking stats for SmartScreenR Application Reputation built-in Internet Explorer (IE) 7, 8, and 9. This issue was much too interesting for me to not follow up with my own thoughts. Having also read the Microsoft blog article […]

Read more ...


MONDAY, JULY 13, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments