The Latest in IT Security

Posts Tagged ‘mobile devices’

Due to additional research of the Trojan.Milicenso threat (a.k.a “Printer Bomb”), we have determined that the threat is downloaded by an .htaccess redirection Web attack and that at least 4,000 websites have been compromised by the gang responsible for the threat. Redirection using the .htaccess fileThe .htaccess file is a configuration file for Web servers that […]

Read more ...

Social media websites like Facebook, Twitter, Google+, Formspring, MySpace and others have gained millions of users in the last years. Persons from 9 to 90 years old are registered, post content in form of text, photos and video. Even if you have your kids as contacts on social networking sites, there is a lot that […]

Read more ...

During my investigation of mobile threats in the wild, I discovered a spytool, which is currently available on Google Play, that is actively being discussed on certain hacker forums. This tool’s beta version is available on the site since March 11. An estimated 500 – 1000 users have already downloaded the said spytool, which Trend […]

Read more ...


Categories

THURSDAY, MARCH 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments