The Latest in IT Security

Posts Tagged ‘legacy’

Yesterday as I was testing Facebook’s Graph Search, which is in Beta, I searched for the following: women who live in Helsinki, Finland and who like sushi. (I wanted something that would get lots of results. It did.)At the end of the day, I cleared my search history.Then today, a sponsored story for a Helsinki-based […]

Read more ...

At the start of 2011, blackhat SEO was very much alive and kicking, and was being aggressively used to infect users with malware [1 ,2]. By May 2011, our detection for the malicious redirect used in these attacks, Mal/SEORed, was dominating our threat stats. Note: For readers that want a a quick recap on how […]

Read more ...

Another Android malware utilizing the root exploit “Rage Against The Cage” has been found, and we detected it as Trojan:Android/DroidKungFu.A. This new malware was embedded on a trojanized application that may require a root access in order to conceal itself. The infection occurs in two parts: Infection: Part 1 The first part is the installation […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments