The Latest in IT Security

Posts Tagged ‘security researchers’

Security researchers at Trusteer are calling attention to a new malware toolkit that uses the I2P (Invisible Internet Project) networking layer to mask communications between infected machines and the botnet’s command-and-control server.

Read more ...

On Wednesday at the Mobile Pwn2Own hacking contest taking place at the PacSec Applied Security Conference in Tokyo, security researchers demonstrated two iPhone exploits that leverage Apple’s Safari mobile web browser.

Read more ...

Security researchers from distributed denial-of-service (DOS) protection solutions provider Arbor Networks have come across a DOS tool that appears to be specifically designed to launch attacks against the main Obamacare website, HealthCare.gov. The tool has been written in Delphi and is designed to send layer 7 r…

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments