The Latest in IT Security

Posts Tagged ‘mdash’

Our Threat Solutions team discovered an interesting threat using a novel “infection vector” for Android today. Back in July, they analyzed Spyware:Android/SndApps, which, after an update, is able access various bits of personal information. Before the update, it only requests the “Internet” permission. It seems probable to us that users are less likely to carefully […]

Read more ...

There’s something new brewing in Mac malware development (again). Recent analysis has revealed to us that Trojan-Downloader:OSX/Flashback.C disables the automatic updater component of XProtect, Apple’s built-in OS X anti-malware application. First, Flashback.C decrypts the paths of XProtectUpdater files that are hardcoded in its body: Flashback.C decrypts the path of the plist file of XProtectUpdater Flashback.C […]

Read more ...

Members of the Internet collective known as “Anonymous” are often described as hacktivists. But are they really? Or are they really just activists (is that what they’ve become)? We follow various Anonymous news accounts on Twitter and ever since the sub-collective, LulzSec, petered out, Anonymous has shifted away from talking about online attacks and hacks […]

Read more ...


Categories

WEDNESDAY, MARCH 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments