The Latest in IT Security

Posts Tagged ‘Celebrities’

It sounds like a fun application – scanning your friends profile photos and then matching them with the celbrity that they most closely resemble.  If only it actually worked.It starts with a friend’s post:Post text (in Spanish):Descubre a que famosos se parecen tus amigos en esta divertida y sorprendente aplicacion. Analizaremos el perfil de tus […]

Read more ...

As you can see in the following video, it’s easier to hijack a Facebook page than you would expect, because of sloppy security from the social network. (Enjoy this video? Check out more on the SophosLabs YouTube channel and subscribe if you like.) The question is – will Facebook do anything about it? Facebook pages […]

Read more ...

It did not take too long after I found out about the discovery of Gingermaster, the first Android malware to use the Gingerbreak exploit, to acquire a sample which was still available from a Chinese alternative Android Marketplace. The package I downloaded uses the following permissions: android.permission.READ_PHONE_STATE android.permission.READ_LOGS android.permission.DELETE_CACHE_FILES android.permission.ACCESS_CACHE_FILESYSTEM android.permission.WRITE_SECURE_SETTINGS android.permission.ACCESS_NETWORK_STATE android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.MOUNT_UNMOUNT_FILESYSTEMS […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments