The Latest in IT Security

Posts Tagged ‘submission’

While investigating some new malware samples this week, we came across a few interesting files that use a new trick with an undocumented instruction. We had to do a bit of digging around the Intel instructions list to solve this little mystery. While it turned out that the trick itself isn’t effective in complicating debugging […]

Read more ...

This fake CareerBuilder email has a malicious attachment containing malware.Date:      Tue, 23 Apr 2013 11:13:54 -0700 [14:13:54 EDT]From:      CareerBuilder [[email protected]]Subject:      CareerBuilder NotificationHello,I am a customer service employee at CareerBuilder. I found a vacant position that you may be interested in based on information from your resume or a recent online submission you […]

Read more ...

We have analyzed close to 100,000 URLs since we launched Zulu in January 2012. Zulu provides real-time analysis of web content to determinate whether it is safe or malicious. Our goal is and always has been to make this free service easy to use and understand. We have made significant improvements to Zulu at all […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments