The Latest in IT Security

Posts Tagged ‘Application’

A Polish research group claims there are still several outstanding vulnerabilities in Google App Engines for Java, including three complete Java sandbox escapes. After three weeks of radio silence from Google, it decided to disclose on Friday the vulnerabilities, along with proof of concept code. The code doesn’t break the sandbox, but does result in […]

Read more ...

One of the big lessons that we’ve learned in the last ten years is that even little pieces of once disparate data, gathered in a single location, can yield startling truths. With #facebook, that lesson crystallized with the introduction of its Graph Search feature in 2013, when the online world realized – to its horror […]

Read more ...

A design constraint of #touch id limits its applicability to authorised actions on a device. Here’s what app developers and end users need to know. #apple‘s Touch ID recognises fingerprints and tells you whether the fingerprint on the sensor has been registered. Every fingerprint authorised on a device is equivalent; this is an important design […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments