Top of Page
In this report, we discuss increasingly malicious PUAs, and following on from our last report we cover actual usage cases for ID management technology, as well as initiatives for bolstering its security. We also look at the IOCs for malware that reprograms HDD firmware.
In this volume we report on spam trends incorporating the 52 weeks' worth of data from March 31, 2014,to March 29, 2015, while referencing data from IIR Vol.1.Additionally, in our commentary on email technologies we discuss the RFC for DMARC that was authored recently, as well as the email framework for using DMARC, and the email ecosystem including domain reputation and feedback.
In live streaming of the National High School Baseball Championship held at Koshien Stadium(Summer Koshien) in August 2014, peak traffic of 108 Gbps was recorded, and there were approximately 1.9 billion requests. Here we examine the scale of access, as well as differences in access trends based on device types, as revealed by the results of analyzing the logs of all delivery servers.
End of the page.