The Latest in IT Security

Posts Tagged ‘security solution’

There are various active spam campaigns spreading on the pinboards of Pinterest users, such as e.g. fake H&M coupons, an offer for a free coach handbag, fake Walmart, Ikea, Starbucks, Apple iPad, etc. Some Pinterest accounts have at least one whole album full of those dubious offers, promoting various brands: It’s the usual game: people […]

Read more ...

Part two of our three part series Anatomy of a Crimeware Syndicate. In part one we talked about the hierarchy and operations of a crimeware syndicate. Today we’re going to talk about the threat landscape that sustains crimeware and part three will look at solutions organizations can implement to reduce their risk.   Crimeware syndicates […]

Read more ...

Malware is often embedded in email as compressed attachments (such as .zip, .rar, etc.). Recently, however, Symantec has noticed an increase in malicious email attacks with .htm (HTML) attachments. Here is what the message looks like in your inbox: The attack contains a .htm attachment and obfuscated JavaScript is embedded in the coding of the […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments