The Latest in IT Security

Posts Tagged ‘miscreants’

Anonymity disguised as freedom of expression and lack of clear cut laws makes cyberspace murky from a security point of view. Countries are waking up and realizing that there is a need for laws which enable authorities to catch and punish cyberspace miscreants; however, these miscreants are very crafty.Spammers are known to use ingenious methods […]

Read more ...

While the actual Bitcoin currency might have its ups and downs, the notion that it is real actual money has by now been firmly implanted in the minds off miscreants everywhere, as shown by the steady increase in the number of detected btc stealer trojan samples: The Trojan.Dropper.PWS e-threat comes in a packed dropper which […]

Read more ...

As mentioned by me on Twitter, it seems that the entity or entities behind the watering hole attacks don’t care to be caught or detected, and it also seems that they don’t care if the Internet Explorer and Java vulnerabilities are patched. They act as opportunists and try to take advantage from the time frame […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks