The Latest in IT Security

Posts Tagged ‘vectors’

In the first part of this series, we discussed the entry points that an intruder could use to attack our “building,” our metaphor for network security. In the next few posts, we shall focus on the next level: attack vectors. If vulnerabilities are the entry points, then attack vectors are the ways attackers can launch […]

Read more ...

The latest MSRT release included coverage for two more malware families, one being Win32/EyeStye, which we discussed earlier this month, and the other being Win32/Poison. In tandem with our efforts to provide an antidote to the scourge of Win32/Poison infections via the MSRT, we’ve also today published a detailed MMPC Threat Report on the same […]

Read more ...

Last week, I attended the Francopol conference on cybercrime in Nicolet, Canada, inside the impressive Quebec National Police School. As in 2010, I was impressed by the sessions and speakers taking part. Here are some elements I would like to share with you.A part of the talks approached the techniques used online by suspects to […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments