The Latest in IT Security

Posts Tagged ‘functionality’

Mikko Hyponen, who has been tracking the R2D2 thing assiduously, observes with some surprise that he hasn't seen a single article on "R2D2" that would try to defend the need for lawful interception. Actually, I haven't either, but I think there are at least two separate issues here. It seems fairly clear from the reports I've seen […]

Read more ...

Chaos Computer Club from Germany has tonight announced that they have located a backdoor trojan used by the German Goverment. The announcment was made public on ccc.de with a detailed 20-page analysis of the functionality of the malware. Download the report in PDF (in German) The malware in question is a Windows backdoor consisting of […]

Read more ...

Facebook widgets, including the “Like” buttons, are often used to spread spam and propagate scams. Typically, the scammer creates a page with a fake video player. Users are tricked into clicking on Facebook Like buttons hidden behind a fake Play button. This is called Likejacking, and it’s a specific form of clickjacking. I have posted […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments