The Latest in IT Security

Posts Tagged ‘screenshot’

Over the past week or so, there has been an ongoing discussion on the Internet about some Android applications that looked suspicious. Most of the apps were supposedly designed to mimic popular games in Japan or play a video in relation to the game. However, users who installed the apps questioned their legitimacy. Symantec has […]

Read more ...

by Jason Ding, Research Scientist Internet hackers never stop working hard to phish victims with new strategies, even on the coming Easter day. Last night, when one of our colleagues logged into his Facebook account to check around, he received the following two Facebook chat messages from his friends: The text associated with these notes […]

Read more ...

The exploit Used environment: Windows XP SP3 with Adobe Acrobat 9.4.6 This U3D memory corruption vulnerability (CVE-2011-2462) could cause an application crash and potentially allow an attacker to take control of the affected system. After the malicious PDF file is opened, new process pretty.exe (this file is changed all the times.) is created. We can […]

Read more ...


Categories

SUNDAY, MARCH 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments