The Latest in IT Security

Posts Tagged ‘security products’

Malware striking Mac computers is making the headlines again, this time exploiting a vulnerability in Java that has left Apple users dangerously exposed to attack.The new Mac malware exploits a Java vulnerability (known as CVE-2012-0507), that Apple users are still not patched against.Apple users won’t feel any consolation at all in the knowledge that their […]

Read more ...

Although Blackhole has been investigated and dissected multiple times, there are still some surprises that emerge. One thing we just discovered is an exploit for CVE-2011-0559, which is one of the two Flash exploits being used by Blackhole currently.Compared to other exploits, this one has been used by Blackhole for quite some time and yet. […]

Read more ...

We thought the rogue security software trend went down this year, but in truth we are witnessing two new reported incidents by users and customers of rogues. Total Defense Internet Security Intelligence Team has just identified the “Winwebsec” family as the most prevalent rogue software recently perceived. According to data obtained, in only one month […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments