The Latest in IT Security

1

The most important of these flaws is a critical bug in System that could be exploited to execute arbitrary code remotely. To exploit the vulnerability, an attacker needs to use a specially crafted transmission, Google explains. This is one of the two critical remote code execution issues patched in System, both affecting Android releases 8.0 […]

Read more ...

1

Over the last few years, security researchers have been able to crack various Android phones during Pwn2Own hacking competitions. Now one firm has collected its research and finds a potentially significant global problem: Android security may be dependent on the country of use. One problem is the open and global nature of the Android operating […]

Read more ...


Categories

FRIDAY, JUNE 05, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments