The Latest in IT Security

Posts Tagged ‘hellip’

Evernote is now officially a member of the recently hacked. The company develops software for notetaking and archiving. Its customers received password reset notifications over the weekend. Almost 50 million e-mail addresses and usernames have also been exposed by the hack. Evernote customer’s should therefore be wary of targeted phishing attacks. How was Evernote hacked? […]

Read more ...

By all measures, Java is the current title holder for the lowest hanging fruit in computer security. (And by Java, we mean JRE and its various browser plugins.) It wasn’t always so. How did it happen? Let’s review some highlights in the history of low hanging fruit. From 2004 to 2008: Attacks shifted from Windows […]

Read more ...

When I first started working in the antivirus industry, I found that learning how Java exploits work, even at a very high level, was difficult. Even now with a few seasons under my belt, understanding the process and consequences of the exploitation of a Java vulnerability still proves challenging. Based on the feedback we see from […]

Read more ...


Categories

SUNDAY, MAY 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments