The Latest in IT Security

Posts Tagged ‘assets’

The idea of people leaving their Facebook passwords in their wills is certainly not a mainstreaan concept- at the moment. However, if one really stops to think of it, our growing reliance on internet based services prompts the necessity of such action. In fact, a study conducted in behalf of Rackspace, a cloud computing company, […]

Read more ...

It did not take too long after I found out about the discovery of Gingermaster, the first Android malware to use the Gingerbreak exploit, to acquire a sample which was still available from a Chinese alternative Android Marketplace. The package I downloaded uses the following permissions: android.permission.READ_PHONE_STATE android.permission.READ_LOGS android.permission.DELETE_CACHE_FILES android.permission.ACCESS_CACHE_FILESYSTEM android.permission.WRITE_SECURE_SETTINGS android.permission.ACCESS_NETWORK_STATE android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.MOUNT_UNMOUNT_FILESYSTEMS […]

Read more ...

The Timthumb 0-day security vulnerability is generating a lot of noise and for a good reason. If you have a theme with that installed, your site can be easily hacked. Because of that, we checked the WordPress free repository and listed the themes in there that include this script. If you use any of them, […]

Read more ...


Categories

SUNDAY, MAY 05, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments