The Latest in IT Security

Posts Tagged ‘gadget’

Update 7/30/2015 3:00pm EST: GM tells WIRED that it has now fixed the vulnerability that Kamkar’s proof-of-concept device exploited, with no action necessary for OnStar users. Kamkar says the problem is not yet resolved, however, and has been told by GM that the company is still working on it. GM’s Onstar service offers some of […]

Read more ...

Sophos – Facebook users are being targeted in a scam that offers them the opportunity to get their hands on a free iPad Mini.The brand new iPad Mini will start arriving on lucky Apple fans’ doorsteps on Friday. But if you haven’t already ordered yours, you are too late. Apple sold out of the regular […]

Read more ...

Yesterday, it’s reported that there is an IE 0day actively exploited in the wild. We did a quick analysis and have some interesting findings.The exploit contains 4 parts: exploit.html – first stage exploiting web page (initialize variables and load the .SWF file). Moh2010.swf – encrypted SWF using DoSWF, it contains shellcode and heap spray code.  […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments