The Latest in IT Security

Posts Tagged ‘algorithm’

For the past six years, #volkswagen has been cheating on the emissions testing for its diesel cars. The cars’ computers were able to detect when they were being tested, and temporarily alter how their engines worked so they looked much cleaner than they actually were. When they weren’t being tested, they belched out 40 times […]

Read more ...

For as much as 20 years, all versions of the LempelZivOberhumer (LZO) algorithm for compression and decompression have been vulnerable to remote code execution and denial-of-service type of attacks. The flaw has lasted this long and has been perpetuated in all variants of the algorithm because every new implementation featured the core open-source code. Don […]

Read more ...

Bitcoin issues have been front-page news in recent months, especially after its surprising April exchange rate. In the latest McAfee Threats Report, for the second quarter of 2013, we discuss this topic. The following timeline highlights recent events about this virtual currency. In our report we noted the growing interest in malware Bitcoin miners: malware […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments