The Latest in IT Security

Posts Tagged ‘functionality’

Hesperbot – Technical Analysis: Part 2/2 Win32/Spy.Hesperbot is a new banking trojan that has been targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. In this 3rd Hesperbot blog post we’ll look at the most intriguing part of the malware – the way it handles network traffic interception. The malware […]

Read more ...

Our mobile security research team has found at least 33 applications that contain aggressive advertising components in the official Google PlayTM store. The developers of these applications choose to imitate well-known companies like GoogleTM, MicrosoftTM, TwitterTM, AVGTM among others. Here’s an example of some applications found in Google Play: This developer is very creative – […]

Read more ...

Early this August, Google retired Latitude, a feature of Google Maps that allowed users to track and share their location with their friends.Latitude also kept a record of a user’s location history, giving them a detailed breakdown of where they spend their time and how much time they spend in each location.Google has announced that […]

Read more ...

Categories

THURSDAY, OCTOBER 18, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks