The Latest in IT Security

Posts Tagged ‘real world’

There are people who might as well be nonexistent if not for their online presence. It’s a weird sort of reality, something that we wouldn’t think we’d see outside those paperback sci-fi novels. It’s also a problem that courts have to face on a daily basis when it comes to serving official documents. It’s extremely […]

Read more ...

I can confirm that we at the Virus Lab “love” product specifications and documentation. My recent experience shows a discrepancy between MSDN and the real behavior of VirtualAlloc. I’m currently revising and tweaking the memory management inside one of the emulators used in the avast! antivirus engine. The goal of my effort is to bring […]

Read more ...

Sometimes, the best way to foil a hacker is to think like one, which is exactly what Rosario Valotta, an Internet security researcher, did. He devised a way to steal digital credentials from Facebook users by exploiting a flaw in Internet Explorer, Microsoft’s default web browser.  He presented the process at the Hack in the […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments