The Latest in IT Security

Posts Tagged ‘Roundup’

How was your weekend, dear Reader? Hope you had a good one!This week’s email threat roundup is a bit longer than usual since we didn’t get to release one during Thanksgiving week.What we have below are noteworthy spam samples found and documented by our researchers in the AV Labs in our Tumblr page. Most of the […]

Read more ...

The first half of the 2011 was marred by a spate of data breaches, vulnerability exploit attacks, the proliferation of more and more Android malware, improved social networking scams, and notable developments in traditional system infections. As our security experts predicted, enterprises suffered from a slew of data breaches of never-before-seen magnitude. This spelled disaster […]

Read more ...

Here’s a roundup post with some snippets from the past day or two along with one or two events you may have missed. Last week, you could (in theory) been searching for the country singer Katie Armiger. No, I have no idea who she is. Anyway, this is what you would have seen: Yes, it […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments