The Latest in IT Security

Posts Tagged ‘url format’

You probably think the person or people behind the Boston Marathon bombing are reprehensible scum? Well, meet their cousins – the slimebags behind the latest malware-distributing spam run we have seen ramp-up overnight. Members of the AVG Web Threats Research team have discovered spam messages using the Boston Marathon explosion to lure potential victims to […]

Read more ...

Recently it was announced via posts in underground forums and Pastebin posts that a new version of the Blackhole Exploit Kit (BHEK), version 2.0, had been released. (The original announcement was in Russian; an English translation has been provided by researcher Denis Laskov and may be found here.) We cannot confirm that BHEK 2.0 has […]

Read more ...

We’ve noticed a few odd rogue security software applications recently—although this type of threat is nothing new, these samples are interesting because they target the Mac OS X operating system. There have been several variants of a threat, which we detect as Rogue:MacOS_X/FakeMacdef, going around this month. As you would expect with any rogue antimalware […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments