The Latest in IT Security

Posts Tagged ‘functionality’

Another Android malware utilizing the root exploit “Rage Against The Cage” has been found, and we detected it as Trojan:Android/DroidKungFu.A. This new malware was embedded on a trojanized application that may require a root access in order to conceal itself. The infection occurs in two parts: Infection: Part 1 The first part is the installation […]

Read more ...

Whenever an average consumer is confronted with the idea of “opting in,” typically they don’t bother. They are not aware they have a choice, it’s too complicated to follow through or they simply don’t understand the importance. A great example of this is Facebook’s introduction of HTTPS via opt-in back in January. In a post […]

Read more ...

Zeus, also known as ZBot, has grown into one of the most popular (or should that be unpopular?) and widespread crimeware kits on the internet.Its ease of use and effectiveness make it an attractive choice for today’s cybercriminals.And an infection by Zeus can be extremely costly. Whether you’re an individual or an organisation, the impact […]

Read more ...


Categories

WEDNESDAY, FEBRUARY 26, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments