The Latest in IT Security

Posts Tagged ‘mdash’

08
Sep
2011

We have just encountered a number of Android riskware applications that target subscribers in the China region. The suspect applications cover a variety of topics, including horoscopes, farm and pet games/info and the Chinese calendar, to name a few. Below is a screenshot of the permissions requested by one of these applications: However, some of […]

Read more ...

Almost from the beginning of the DigiNotar CA Disaster (report here), we had a reason to believe the case was connected to “ComodoGate” — the hacking of another Certificate Authority earlier this year, by an Iranian attacker. This connection has now been confirmed. After ComodoGate, the hacker — who called himself ComodoHacker — sent a […]

Read more ...

Hello Microsoft, A partner of ours is feeling some pain. He’s located in Central Europe and some of his customers have limited hardware budgets, and so… he ends up doing a lot of Windows XP SP3 installations. (Yes, we know, Windows 7 is cool, but the customer is always right, and you have to give […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments