The Latest in IT Security

Posts Tagged ‘configuration options’

Some years ago, it was common practice to hide options that are most likely not going to be used by everyone. This is how the few advanced options were kept away from the what we call “average user” and made available only to tech-savvy users. On the product’s side, the further development of the technology […]

Read more ...

About a week ago, popular IT news site The Register announced a security hole in Firefox. Under the headline Firefox ‘new tab’ feature exposes users’ secured info: Fix promised, El Reg decried the most recent Firefox release as “unlucky version 13”. The story ended up pretty widely reported, and Mozilla has publicly promised a fix. […]

Read more ...

The Flame malware uses several methods to replicate itself. The most interesting one is the use of the Microsoft Windows Update service. This is implemented in Flame’s “SNACK”, “MUNCH” and “GADGET” modules. Being parts of Flame, these modules are easily reconfigurable. The behavior of these modules is controlled by Flame’s global registry, the database that […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments