The Latest in IT Security

Posts Tagged ‘sophisticated technique’

In October 2011, we documented a particular targeted attack campaign – The Nitro Attacks. In that instance, the attackers were primarily targeting chemical companies. Despite our work in uncovering and publishing the details behind the attacks, the attackers continued undeterred, even using our own report in their social engineering campaign!The attackers have escalated their efforts […]

Read more ...

Spreading malware via email has always been so effective, that it is still widely used by bad guys. As you may know, there were times when email worms like MyDoom, Brontok, etc. infected millions of computers worldwide. Nevertheless, due to efforts of security agencies and antivirus vendors to warn users, the attachment of virus onto […]

Read more ...

This looks like it could be a new series of blog posts. The infamous ( shows yet another payload using a more sophisticated technique. I’ve been monitoring the situation closely and observed a change in today’s malware behaviour. The previous payload was the XP Home Security 2012 rogue which created a randomly named file […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments