The Latest in IT Security

Posts Tagged ‘Researchers’

Though the majority of gaming companies prohibit the real-money trading of online gaming currencies, the practice is still widespread, and according to Trend Micro researchers, the money that cyber-criminals earn through it is used to mount DoS attacks, spam campaigns, perpetrate identity theft and financial fraud against a variety of business and organizations, and so […]

Read more ...

Be careful with what you torrent. A new tool on the black market is helping hackers distribute malware through torrent files in exchange for a fee. On Tuesday, security researchers at InfoArmor said they discovered the so-called “RAUM” tool in underground forums. It leverages torrenting — a popular file-sharing method associated with piracy — to […]

Read more ...

Microsoft has patched a zero-day vulnerability in Internet Explorer that at least two threat actor groups have used for some time to serve malicious advertisements to between 1 million and 5 million users daily. Microsoft was first notified about the so-called information disclosure bug in September 2015, security vendor Proofpoint said in an alert this […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments