The Latest in IT Security

Posts Tagged ‘tw’

The term “Watering Hole” has become a popular way to describe targeted malware attacks in which the attackers compromise a legitimate website and insert a “drive-by” exploit in order to compromise the website’s visitors. Two recent papers by our friends at RSA and Symantec documented such attacks.Of course, such attacks are not new. This technique […]

Read more ...

This domain scam has been around for years.. From:     jeff [email protected] To:    Date:     3 May 2012 10:02 Subject:     Regarding ” dynamoo ” Dispute (If you are not in charge of this please transfer this email to your President or appropriate person, thanks) Dear President, We are the department of Asian Domain registration service in china, […]

Read more ...

Have you ever tried to visit your site and you got redirected to a different site? Maybe some external news page that had nothing to do with your site? Then have you tried to visit it again to test and it worked properly? Over the last few days we’ve been getting this question often and […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments