The Latest in IT Security

Posts Tagged ‘mdash’

A few weeks ago, we wrote about the Oracle Java Runtime Environment Remote Code Execution Vulnerability (CVE-2012-4681) being used in a targeted attack campaign by the Nitro attackers. Recently, we have discovered another group exploiting this vulnerability in the wild: the Taidoor attackers.The Taidoor attackers began utilizing the vulnerability when the proof of concept (POC) […]

Read more ...

We rely on a good amount of automation and virtualization in our battle against malware. Our opponents, malware authors, know this and they frequently employ new tactics to avoid being processed by our back end systems. One particularly prevalent threat is a “banking trojan” called ZeuS. In the past, we’ve written about a ZeuS variant […]

Read more ...

Symantec has found a privacy-infringing application called Call Cheater Lite previously distributed on Google Play that may also result in unwanted SMS charges . The purpose of this app is to block unwanted phone calls from certain individuals (debt collectors, ex-girlfriends and boyfriends, etc.) by giving the owner of the phone the ability to play […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments