The Latest in IT Security

Posts Tagged ‘Status’

We have not seen very many large scale malvertising attacks following the mysterious disappearance of the powerful Angler EK. The ones we do see tend to be related to low quality traffic and usually push the less sophisticated RIG or Magnitude exploit kits. The last high profile malvertising activity we had caught was on June 7th with […]

Read more ...

More than half of Alexa top 500 domains allow email spoofing because their owners have failed to properly configure email servers, according to web security firm Detectify. Email spoofing has often been used in spam, phishing and fraud campaigns, which is why the industry has created several validation and authentication systems designed to prevent unauthorized […]

Read more ...

Network security is often a game of reaction, instead of prevention. Threats seem to come in all shapes and sizes, and from all different directions. You plug one hole and ten more appear on your radar. Sometimes you just want to stick your head in a hole and hope it all goes away. Other times, […]

Read more ...


Categories

SATURDAY, MARCH 15, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments