The Latest in IT Security

Posts Tagged ‘2015’

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability stems from a feature first added to the x86 architecture in 1997. It was disclosed […]

Read more ...

Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly that hack happened. At the start of their research Miller and Valasek tried to hack the multimedia system of Jeep through Wi-Fi connection […]

Read more ...

More than 440,000 new strains of Android malware were discovered by security experts at G DATA analyzing data for the first quarter of 2015. That the company’s Q1 2015 Mobile Malware Report found so many strains of malware, representing a 6.4 percent jump from the quarter before, is not surprising, considering half of U.S. consumers […]

Read more ...


Categories

SATURDAY, APRIL 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments