The Latest in IT Security

Posts Tagged ‘real world’

Members of the Internet collective known as “Anonymous” are often described as hacktivists. But are they really? Or are they really just activists (is that what they’ve become)? We follow various Anonymous news accounts on Twitter and ever since the sub-collective, LulzSec, petered out, Anonymous has shifted away from talking about online attacks and hacks […]

Read more ...

Running a small business can be a difficult job (particularly in today’s economic climate). Competition can be very cut-throat… and dirty tricks are sometimes played by the unethical. For example: In 2003, Saad Echouafni, owner of Orbit Communications (a satellite television reseller), paid for an Ohio botmaster (Richard Roby) to DDoS the websites of two […]

Read more ...

Android malware has been around for a while now, but it has been somewhat uncertain how prevalent infected devices are. The Wildlist has been used as a measure to show which viruses are prevalent. What is interesting about the first Extended Wildlist in August 2011 is the inclusion of three pieces of Android-based malware. I […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments