The Latest in IT Security

Posts Tagged ‘dialogs’

I’ve written about Shell Extension without ASLR support before. Not only do they open up explorer.exe to ROP attacks, but other applications too, like Adobe Reader and Microsoft Office. You could use EMET to force ASLR on these DLLs, assuming you know which applications load shell extensions. Because shell extensions are not only loaded into […]

Read more ...

More scams are plaguing Facebook users, who are clicking on links thinking they are going to be able to view saucy or amusing videos. The scammers themselves aren’t using an awful lot of imagination, once again using Italian TV hostess Marika Fruscio’s wardobe malfunction as bait to get users to click. And once again exploiting […]

Read more ...

Are you a Mac user who’s ever gone looking online for what Oracle calls the Java Platform – either the JRE (runtime environment) or the JDK (development kit)? You’ll have noticed what seems at first to be a glaring omission: You can download the latest updates for Linux, Solaris and Windows – and even for […]

Read more ...


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments