The Latest in IT Security

Posts Tagged ‘power tools’

Although both Edward Snowden and his complete stash of documents remain hidden away from the British government, that didnt stop officials from trying to take action: they went after computers at The Guardian containing information leaked by the whistleblower with power tools. Newly-released video from the paper shows exactly how editors and GCHQ technicians destroyed countless computers […]

Read more ...

The word Trojan has many meanings, and when it is used without qualification in headlines, it’s hard to know which one is meant. An olden-day Trojan was an inhabitant of the ancient city of Troy, near modern Canakkale in Turkey, on the Anatolian side of the Dardanelles. The word is also short for Trojan horse. […]

Read more ...

  Websense Security Labs™ ThreatSeeker® network has determined that the popular online Pakistani newspaper Web site the 'Daily Jang' (at has been compromised. Websense customers are protected from this attack by ACE, our Advanced Classification Engine.  The Web site has been injected with malicious code in several locations. The code redirects visitor browsers to exploit Web sites. At the […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks