The Latest in IT Security

Posts Tagged ‘month of the year’

For many of us around the globe, August may be a month to take a bit of a break from work and go on a summer holiday. In contrast, August appears to the busiest month of the year for the scammers developing Japanese one-click fraud apps. They have increased productivity to publish close to 1,000 […]

Read more ...

In the last month of the year, MySQL has been flooded by a set of zero-day exploits. This set was revealed by Kingcope and he has published proof-of-concept (POCs) for all these vulnerabilities.The newly discovered set of 0-days affects MySQL in multiple ways, such as application crash/denial of service, privilege escalation, authentication bypass, remote root […]

Read more ...

The last summer month of the year saw a noticeable increase in activity on the part of virus makers and Internet fraudsters-pretty much in line with our expectations. Fraudsters crafting paid archive hoaxes came to incorporate malicious software such as Trojan.Mayachok.1 into their “products”. Compared with July, the number of new threats discovered by Doctor […]

Read more ...

Categories

THURSDAY, OCTOBER 18, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks