The Latest in IT Security

Posts Tagged ‘digital signature’

Russian anti-virus company Doctor Web discovered the first malignant application for Android that spreads by exploiting the vulnerability Master Key. Android.Nimefas.1.origin can send text messages, transmit confidential information to criminals and allows intruders to remotely execute certain commands on the infected mobile device. Currently the Trojan is spread with games and applications which are available […]

Read more ...

Earlier this month, we discussed the discovery of the Master Key vulnerability that allows attackers to inject malicious code into legitimate Android applications without invalidating the digital signature. We expected the vulnerability to be leveraged quickly due to ease of exploitation, and it has.Norton Mobile Insight-our system for harvesting and automatically analyzing Android applications from […]

Read more ...

In this blog we shall reveal the uses for certificates, uncover how to combat abused certificates and dig deep into an example of how malicious software can be digitally signed to pass certification verification. What is a certificate? In cryptography, a public key certificate, also known as a digital certificate, is an electronic document that […]

Read more ...

Categories

TUESDAY, OCTOBER 15, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks