The Latest in IT Security

Posts Tagged ‘language customization’

When Motorola returned from Googles wilderness, it came back with a new approach to phone design and customization. The Moto X was the subject of plenty of envious glances from the other side of the pond, and while the Moto G is an excellent low-end smartphone, it couldnt entirely scratch that itch, you know? Thats […]

Read more ...

Following on from the exploitation of the Microsoft Internet Explorer CVE-2012-1875 Same ID Property Remote Code Execution Vulnerability (CVE-2012-1875) detailed in our previous blog, Symantec has also observed continued exploitation of the Microsoft XML Core Services CVE-2012-1889 Remote Code Execution Vulnerability (CVE-2012-1889) in the wild. This vulnerability involves one of the functions of the MSXML […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments