The Latest in IT Security

Posts Tagged ‘HTML’

HP’s Zero Day Initiative (ZDI) Monday disclosed four unpatched zero-day vulnerabilities in Internet Explorer Mobile that can enable a remote attacker to execute arbitrary code. Three of the bugs are use-after-free vulnerabilities that exist within the handling of CTreePos objects, CCurrentStyle objects and CAttrArray objects, advisories issued by Microsoft indicated. The fourth flaw is an […]

Read more ...

In our everyday world, we sometimes make use of thin clients, which don’t have a lot of functionality but are easy to maintain, as their functionality is based on data they receive from remote servers. Malware authors have adopted a similar technique, in which malware is able to download executable code without actually downloading an […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments