The Latest in IT Security

Posts Tagged ‘prey’

Back in June we discovered a malicious Android application that was holding user’s Android phones for ransom. This discovery confirmed earlier predictions that ransomware would evolve and arise on new platforms, such as mobile devices.As part of our pre-emptive SMS spam domain identification, we have detected a recently-registered domain that is currently serving a new […]

Read more ...

As evidenced by its recent milestone of 1 billion users, Facebook is one of the fastest growing social networks in the world. It is expanding the quickest in countries like Indonesia, a country of 240 million where there are already 50 million Facebook users. However, many users in Indonesia are teenagers who don’t know how […]

Read more ...

If you want, you can choose to believe that the people behind some Malware made to look like an MP3 called “Delfin2.exe” did so in a ruse to bait fans of Andean techno-folklore music creator, Delfin Quishpe. You could also choose to believe that they just forgot to call it something other than a common […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments