The Latest in IT Security

Posts Tagged ‘technicalities’

The Wildlist is a list of viruses that is maintained by the Wildlist Organization. The intent is to have a list of viruses that is representative of what is really out in the Wild (Antivirus vendors’ name for what our customers will face). The list of viruses is provided by experts that submit virus samples […]

Read more ...

The arrest of a 19-year-old man suspected of being connected with the LulzSec internet attacks against various organisations has certainly made the headlines. Here’s a selection of today’s front pages here in the UK: As Dan Raywood, a security reporter with SC Magazine, pointed out on Twitter, The Sun should win a special accolade for […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments