The Latest in IT Security

Posts Tagged ‘imei’

The Motorola Nexus 6, codenamed “Shamu,” might not actually be a Nexus 6 device, as many reports have said so far. Instead, the device could be an Android Silver heading to Verizon in the near future, TKTechNews seems to indicate. FROM EARLIER: Benchmark reveals the Nexus 6’s specs are just as great as you hoped […]

Read more ...

Those last few months, we have been using and tuning a data mining engine developed by researchers of Telecom ParisTech. The tool is named Alligator, mostly because we believe alligators are hungry animals 🙂 (and a little because this means “_AnaLyzing maLware wIth partitioninG and probAbiliTy-based algORithms_”). Integrated in our own crawling, property extraction and […]

Read more ...

Protip: don’t install an Android application package file if it’s named “Certificate.apk”.It’s not legit (obviously).Trojan:Android/Pincer.A is able to forward SMS messages and perform other actions based on commands it receives from its C&C. When installed, it will appear in the application menu as “Certificate” and will display related bogus messages when run. Previous malicious mobile […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments