The Latest in IT Security

Posts Tagged ‘runtime environment’

In an ironic twist of events, the news about the malicious email campaign that leverages political issues related to Tibet is now being used in a separate campaign resulting to malware infection. So far, we have encountered two email campaigns using this particular social engineering technique. The first one, according to reports, has a spoofed […]

Read more ...

Senior Malware Analyst James Dee found a fake domain that claimed it has anything to do with Skype vouchers. This voucher, which is a form of Skype Credit, has been around for quite some time so it already has an amount of prominence with 663M* Skype users. Anyway, the website is skypevouchers(dot)com. click to enlarge […]

Read more ...

Categories

MONDAY, NOVEMBER 19, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks