The Latest in IT Security

Posts Tagged ‘Exploit’

We’ve come across a malicious Olympic themed PDF earlier this morning while data mining our back end for documents which drop executables (those are never a good thing, unsurprisingly). The PDF exploits CVE-2010-2883, which affects older versions of Adobe Reader and Acrobat. A typical PDF exploit will launch a clean decoy as part of its […]

Read more ...

Facebook had somewhat of a privacy overhaul in September 2011. One of the most welcome changes that users had been screaming for is the ability to approve tags before they are posted to their profile. The photo-tagging exploit has been abused by scammers on a grand scale! Follow these simple instructions to enable the feature […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments