The Latest in IT Security

Posts Tagged ‘hashes’

On December 16, 2012, CERTCC-IR posted an advisory regarding a new threat that wipes disks. We have recovered samples matching the hashes mentioned in their advisory and, based on preliminary analysis, can confirm their findings.The samples are not sophisticated and will wipe any drives starting with the drive letters D through I, along with files […]

Read more ...

Adobe’s head of product security, Brad Arkin, published a very interesting post on Thursday. As it turns out, one of Adobe’s build servers was compromised and was used to create malicious files with Adobe’s digital signature. Inappropriate Use of Adobe Code Signing Certificate: According to accompanying Security Advisory, there are two “utilities” using three files. […]

Read more ...

The first batch of iPhone 5s will be delivered on Friday of this week. Apple sold more than 2 million of the new phone in less than 24 hours so clearly there's a huge interest in getting the device. This means that many people are eagerly waiting for their shipping notifications, to learn when the phone will arrive. I'm one of the […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments