The Latest in IT Security

Posts Tagged ‘white spaces’

From time to time, we see in our labs really funny emails pretending to be deadly serious. This time, I received one such email on my personal email address, and I couldn’t stop laughing after reading it full. And this, believe me, it was a challenge. Apparently, you see an empty email with only a […]

Read more ...

Attackers have been using the .htaccess file for a while. They use this file to hide malware, to redirect search engines to their own sites (think blackhat SEO), and for many other purposes (hide backdoors, inject content, to modify the php.ini values, etc).Why do they use the .htaccess file? For multiple reasons. First, the .htaccess […]

Read more ...

Categories

SATURDAY, OCTOBER 20, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks