The Latest in IT Security

Posts Tagged ‘inconsistency’

ObfuscationsIn my previous blog, I discussed some stealth techniques Java.Cogyeka uses. These stealth techniques are not effective at deceiving users or security researchers, but their use proves that Java malware is continuously improving.Aside from the stealth techniques, Java.Cogyeka is designed to evade security researchers through various obfuscation techniques. Some are effective, some are overdone. Overdone […]

Read more ...

Kiwicon opened with a software engineering talk which was intensely focused – a case study of a single-line bug in a single source file in a single module in a 70MBbyte programming language distro. The talk, by Kiwi-turned-Northern-Californian coder Geoff Cant, was entitled The Erlang SSH story: from bug to key recovery. Geoff works for […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments