The Latest in IT Security

Posts Tagged ‘Researcher’

It’s no surprise to see that criminals are banking on a highly anticipated sporting event such as the 2012 Olympic Games, which will be held in London, England. And as early as 2010, Olympic-themed spam has been out there. There’s a number of different types, too-from the classic lottery scam mails, to fake tickets and […]

Read more ...

Sophos – A couple of weeks ago (12 June 2012) we published an advisory for a vulnerability in Microsoft XML Core Services, also known as CVE-2012-1889. The vulnerability is a true zero-day, being exploited in the wild, with no patch yet available from Microsoft.The main concern in such situations is the speed with which we […]

Read more ...


Categories

WEDNESDAY, APRIL 09, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments