The Latest in IT Security

Posts Tagged ‘real nature’

The popular Japanese word processor software Ichitaro is no stranger to threats, particularly exploits taking advantage of the software’s vulnerabilities. Since 2007, we have reported the malware targeting Ichitaro’s security flaws.This time, however, we uncovered an attack that employs an old trick that even Microsoft Office was previously vulnerable to (CVE-2011-1980). Typically, when an application […]

Read more ...

Websense ThreatSeeker® Network has been tracking an ongoing spam campaign relating to reports of Libyan leader Colonel Gaddafi's death.  We have been monitoring related spam campaigns about Gaddafi for a while now, and the recent rumours of his death as stated here on Reuters seem to have raised the bar a little with an influx of such spam.   […]

Read more ...

By Mikko Hypponen, Special to CNNAugust 7, 2011 (CNN) — Geography used to matter in crime. In the real world, you only have to worry about the criminals who live in your city. But in the online world, you have to worry about criminals who could be on the other side of the planet. Online […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments