The Latest in IT Security

Posts Tagged ‘memory’

A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user’s system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page containing an IFRAME with an overly large “height” attribute viewed […]

Read more ...

Repeat after me – Apple is not giving away any free iPads, iPhones or MacBooks in memory of Steve Jobs. Nevertheless, it appears that many people believe that the company is doing a special promotion to honour the passing of their late founder judging by the number of people who are currently being scammed on […]

Read more ...

Facebook scammers are once again exploiting a celebrity’s death. Former Apple CEO Steve Jobs death news is the target, just like many before him. Only few hours after his death, a Facebook page titled “R.I.P. Steve Jobs” is said to have gone up, with text claiming that 50 free iPads were being given out “in […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments