The Latest in IT Security

Posts Tagged ‘Wikipedia’

As mentioned by me on Twitter, it seems that the entity or entities behind the watering hole attacks don’t care to be caught or detected, and it also seems that they don’t care if the Internet Explorer and Java vulnerabilities are patched. They act as opportunists and try to take advantage from the time frame […]

Read more ...

Today, cybercriminals are quick to exploit vulnerabilities in Adobe Reader, Flash and Java to infect users’ computers. There is a simple reason for this popularity: exploits of vulnerabilities found in these products can infect computers regardless of which operating systems and browsers are used on the attacked machines. We assumed that the threats posed to […]

Read more ...

I never thought that I am going to write this post after publishing the two other Improve your security articles about passwords: #8: change the default passwords and #1: complex passwords aren’t always better But, here we are, after seeing three major websites (LinkedIn, LastFM, eHarmony) which got somehow (yes, somehow, because we still don’t […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments