The Latest in IT Security

Posts Tagged ‘operating system’

The threat research team at Bit9 + Carbon Black spent over two months of 2015, 10 weeks to be precise to look into every fragment of a reported case of OS X malware. The findings were as memorable as they were damning. They discovered five times more malware in 2015 than all the malware samples […]

Read more ...

File infectors are malware that are capable of attaching themselves to executable files, e.g. “calc.exe” and “notepad.exe”. When we run an infected file, we don’t notice that “calc.exe” is infected, since it still shows the calculator running properly. But, behind the scenes, the malware is doing its malicious activities. In this post, we will look […]

Read more ...

Last week Google announced a weakness in the Android platform that left users of certain BitCoin wallet applications at risk and potentially allowing the theft of funds. Upon further examination, it emerged that the Android implementation of Java SecureRandom class contains a vulnerability that prevents the generation of secure random numbers to protect the wallet […]

Read more ...


Categories

MONDAY, MARCH 10, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments