The Latest in IT Security

Posts Tagged ‘abuse detection’

Recently, a number of new techniques have been discovered that not only help Android malware evade detection but also help it stay installed even when detection has taken place. We are seeing these techniques incorporated across a large swath of malware families. In this blog post, we’ll do a quick round up of these techniques. […]

Read more ...

Today Google announced its Bouncer security service for the Android Market. This is a good initial step in protecting Android users.Respect the BouncerTo keep out known troublesome apps, the service performs a malware and spyware scan on all submitted material. It also uses behavioral analysis to determine if a given app is trying to do […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments