The Latest in IT Security

Posts Tagged ‘Threat’

Detected by Trend Micro products as Trojan.MacOS.GMERA, the software poses as the Mac-based trading app Stockfolio, but contains shell scripts that allow it to perform malicious activities. To date, two malware samples were discovered, revealing an evolution of the threat. The first sample is a ZIP archive file containing an app bundle (Stockfoli.app) and a […]

Read more ...

Universities can make juicy targets for attackers of all stripes: state-tied advanced persistent threat (APT) groups that want intellectual property (IP), criminals that want money, even the students themselves who might be looking to cause trouble. They all pose a potential threat. Last year 76 universities located across the world were attacked by hackers reportedly […]

Read more ...

Cryptominer-based attacks, not ransomware-based attacks, have been the top threat so far this year, according to Comodo Cybersecurity Threat Research Labs’ Q1 Global Malware Report. In the first three months of 2018, Comodo said it “detected 28.9 million cryptominer incidents out of a total of 300 million malware incidents, amounting to a 10 percent share. […]

Read more ...

Categories

FRIDAY, OCTOBER 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks