The Latest in IT Security

Posts Tagged ‘second generation’

Jumcar stands out from other malicious code developed in Latin America because of its particularly aggressive features. At the moment three generations of this malware family exist, which basically use symmetric algorithms in the first and second generation, and an asymmetric algorithm in the third. In this manner the configuration parameters are hidden, progressively increasing […]

Read more ...

Today Kaspersky Lab’s team of experts published a detailed research report that analyzes a sustained cyberespionage campaign conducted by the cybercriminal organization known as Winnti. According to report, the Winnti group has been attacking companies in the online video game industry since 2009 and is currently still active. The group’s objectives are stealing digital certificates […]

Read more ...

Technology giant Hewlett-Packard has unveiled a broad set of new notebooks, including a selection of systems aimed at business and corporate customers-but that pack features even consumers might find appealing. HP is also getting into the 3G connectivity business, offering a new DataPass mobile broadband service that enables users to buy pre-paid broadband data service […]

Read more ...


Categories

FRIDAY, NOVEMBER 15, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments