The Latest in IT Security

Posts Tagged ‘instances’

One of our analysts has discovered something interesting while debugging the latest version of Flashback, a Mac trojan that attempts to trick people into believing it’s an Adobe Flash Player update. While comparing the differences between Flashback.A and Flashback.B, he saw this routine: Flashback.B performs a “vmcheck”. If virtualization is detected, the trojan aborts itself. […]

Read more ...

Mikko Hyponen, who has been tracking the R2D2 thing assiduously, observes with some surprise that he hasn't seen a single article on "R2D2" that would try to defend the need for lawful interception. Actually, I haven't either, but I think there are at least two separate issues here. It seems fairly clear from the reports I've seen […]

Read more ...

One of the biggest causes of problems in Facebook is the social networking site’s laissez faire approach to applications. Developers have much freedom over the interface and can pretty much upload whatever they want. This results in a surplus of spammy applications that clutter up not only the newsfeed but also the person’s profile. Facebook, […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments