The Latest in IT Security

Posts Tagged ‘using tools’

It seems like it happens every holiday. A celebrity or major corporate brand loses control of its Twitter account. Perhaps it is less than coincidental than that the king of burgers was compromised on the American holiday honoring her presidents.Like other recent hacks, it appears to have been done more for the lulz than to […]

Read more ...

New year, same tricks, mostly because they work. That’s how we’re kicking off the new year folks. In September of 2012, Dennis, of Unmask Parasites, first wrote about rogue apache modules being injected into web servers. It has since been all the rave. It seems every week we’re handling more and more cases, from private […]

Read more ...

For the fifth year now we are arranging a course on malware (malicious software) analysis in co-operation with Aalto University in Helsinki, Finland. The first lecture is on January 18th by our Chief Research Officer, Mikko Hypponen. If you are studying at Aalto, we’d be glad to see you on the course! If you have […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments