The Latest in IT Security

Posts Tagged ‘2f’

14
Jun
2011

@RedNose commented on the blog I put up recently about the tool my Russian colleagues have made available for dumping TDL’s hidden file system: I’m going to respond here in case anyone else is confused about this.“I ran the tool and it did not show anything. Does it mean that TDSS is not present?”No, that’s […]

Read more ...

13
Jun
2011

In fact, the main point of the article I just sent up to SC Magazine's Cybercrime Corner, "Stuxnet: Paradigms Lost and Paradise Regained" is that the 'next Stuxnet' probably won't be any such thing, whatever we may choose to call it. Stuxnet was certainly a warning, but the message is a bit less dramatic than […]

Read more ...

OK, if some unimaginative journalist and/or editor can call a pair of bulging briefs “Weinergate” I can call this Twitter App “FireTweet”. Like Firesheep, Royal Test (FireTweet) is an attempt to demonstrate a privacy problem. Techcrunch reported this story and I have verified the privacy issue. Despite allegedly being unable to read private messages, applications […]

Read more ...


Categories

SUNDAY, MAY 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments