The Latest in IT Security

Posts Tagged ‘optimization’

LINUX SYSTEM ADMINISTRATOR Posted: 19 August 2013 Company name: SpamExperts BV Location: Bucharest Romania Poster represents: employer Hours: full time Description:Profile: Do you love working in Linux in general, and are you also a fan of Debian and/or Python? Then we are the right company for you! You will work in a small team, some […]

Read more ...

Last week, Adobe released an advisory (APSA12-01) announcing the upcoming revocation of an Adobe code signing certificate as it was compromised and used to sign at least two malicious utilities. They identified a compromised build server that required access to the code signing infrastructure and have forensic evidence that links it to the signing of […]

Read more ...

Last month, we saw a new Java vulnerability (CVE-2012-1723) being used by malware. This new Java vulnerability is a type-confusion, same as the notorious CVE-2012-0507 AtomicReferenceArray vulnerability. The vulnerability was resolved on June 12th by Oracle and a discussion on the vulnerability was made public on June 13th (though some security updates had appeared in […]

Read more ...


Categories

SATURDAY, JULY 13, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments