The Latest in IT Security

Posts Tagged ‘mdash’

As mentioned in our previous post, there’s an Internet Explorer (zero-day) remote code execution vulnerability being exploited in the wild which affects IE 8, as well as IE 6 & 7. Those versions of IE account for about one third of all desktop browser market share.Current exploitation is limited but it’s quite likely a reliable […]

Read more ...

Finland has a rather small population in which F-Secure has a relatively large market share. (Natch.) And every so often, something “big” will occur in such a way that Finland becomes a kind of statistical laboratory. Here’s a graph of malware detections (as in preventions) that occurred in Finland from November 24th to November 27th. […]

Read more ...

Do you ever use your laptop’s Smart Card reader? You don’t? Yeah, we didn’t think so. (Half of you reading this probably didn’t even realize it had one to begin with.) Windows users: open your Control Panel, go to Administrative Tools, Services — and stop the Smart Card service. Adjust the startup type to prevent […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments