The Latest in IT Security

Posts Tagged ‘security mechanisms’

Chinese intruders gang used to transfer malware in a simple manner – using DropBox and WordPress functionality.The gang is called ‘DNSCalc’, known mainly due to its past intrusions to The New York Times servers and collection of information for months until discovered.This time it turns out that the gang was able to install malware on […]

Read more ...

On August 26, FireEye reported the discovery of a critical vulnerability in Java Runtime Environment versions 1.7x, which was designated as CVE-2012-4681. Oracle released a security patch only on August 30, and, therefore, the vulnerability remained unclosed for at least four days-an opportunity criminals were quick to take advantage of. Doctor Web determined that a […]

Read more ...

Java SE is a platform-independent programming language. It is used on all operating systems – Windows and *nix-based, which increases the scope of exploiting a security vulnerability in Java. I will examine two critical Java security vulnerabilities exploited in the wild during the last few months.Applets in a sandboxJava applets use a sandbox, which restricts […]

Read more ...


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments