The Latest in IT Security

Posts Tagged ‘duration’

This is a recent malware that targets the Android platform. This Trojan like many typical social engineering Trojans, comes bundled with a game. The credit for discovering it goes to Prof.Xuxian Jiang. Since we have published static analysis of such Trojans in our earlier blogs, this blog covers the dynamic analysis of the Trojan in […]

Read more ...

In this week’s Patch Monday podcast on ZDNet Australia, outspoken Aussie technology journalist Stilgherrian interviews Sophos's Paul Ducklin about the real issues behind cybersecurity awareness. This is a topical issue in Australia right now, where it's Cybersecurity Awareness Week – but what does “cybersecurity awareness” really mean? Is it something we can knock on the […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments