The Latest in IT Security

Posts Tagged ‘strange case’

In today’s threat landscape, distributing malware and developing malware are two different worlds. Both require a different set of skills in order to work and in order to achieve their separate goals. For example, in my blog post Get gamed and rue the day…, I described a bot-controlled worm in which the code fragment suggested that […]

Read more ...

I took another quick look yesterday to monitor how we're doing in identifying new sites and servers in the big Fake-AV attack that we blogged about twice in April. The analysts have been keeping an eye out for them, and Maria sent me some this week. Here is a closer look at two of them: […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments