The Latest in IT Security

Posts Tagged ‘security guide’

Open up any news feed on the security industry and you’ll read stories on attacks that started with the end user of the affected company. Whether it’s phishing schemes, social engineering or drive-by downloads, there’s no shortage of ways for attackers to compromise the least patchable resource in a company: its employees. When I first […]

Read more ...

As early as March 2012, we have spotted a number of Tibetan-themed campaigns, and we’ve documented some of them through this blog. So far, the attacks are pretty consistent: they usually arrive as emails with pro-Tibetan sentiments as subjects, and have malicious file attachments.Very recently, however, we found one Tibetan-themed campaign that also touches a […]

Read more ...

Cybercriminals are known to take advantage of sporting events like the London Olympics 2012 for their malicious activities. Some of the attacks that leveraged this event include fake live streaming websites, fraudulent sites that sell bogus tickets, and malicious Olympics-related app hosted in a fake Google Play store. Adding to the list of attacks using […]

Read more ...


Categories

TUESDAY, APRIL 16, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments