The Latest in IT Security

Posts Tagged ‘security applications’

Android allows applications to voluntarily come to foreground or to become active while user is using another application. However, because Android’s SDK allows apps to be pushed to the foreground, Android allows users to dismiss and override this behaviour be hitting the back button. This Android feature is used by many security applications for application […]

Read more ...

A while back a malicious program called DroidDream was found on the Google Marketplace. The thing about DroidDream is that it exploited a vulnerability that gave it root access. Now contrast how Google treats security software. Security applications are not allowed to have root access. The truth is that the most popular mobile platforms (and […]

Read more ...

24
May
2011

Fake BitDefender 2011 is a misleading security software that will mimic the legitimate program in order to deceive computer users. The real BitDefender 2011 can be downloaded from bitdefender.com web site and must be installed manually, while the rogue one’s will be dropped on to computers and be installed without users consent. It is good […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments