The Latest in IT Security

Posts Tagged ‘security application’

At the start of 2011, blackhat SEO was very much alive and kicking, and was being aggressively used to infect users with malware [1 ,2]. By May 2011, our detection for the malicious redirect used in these attacks, Mal/SEORed, was dominating our threat stats. Note: For readers that want a a quick recap on how […]

Read more ...

Security applications and Facebook tend to mix together like oil and water. Folks generally want to share when they’re online — and not to worry about security. Many people don’t use security tools if they prove to be too cumbersome. Therefore, when attempting to develop a security application for Facebook… it had better not be […]

Read more ...

Yes, you have probably heard the news: a new variant of Spitmo – Zitmo/ZeuS’s counterpart for SpyEye, which previously targeted Symbian phones only – has recently been spotted on Android. The scenario is the same as before: a victim, browsing on a PC infected with SpyEye, logs in her bank’s website. SpyEye injects forms and […]

Read more ...


Categories

SATURDAY, APRIL 27, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments