The Latest in IT Security

Posts Tagged ‘shell commands’

As if on queue, almost 7 days since we released the post about the latest W3TC and WP Super Cache remote command execution vulnerability, we have started to see attacks spring up across our network. In our post you might remember this:<!-mfunc echo PHP_VERSION; -><!-/mfunc->In this example we explained how it was a very simple […]

Read more ...

Almost exactly one year ago, Google announced the addition of a “new layer to Android security,” a service codenamed Bouncer that was intended to provide automated scanning of the Android Market for potentially malicious software. However, as my colleague Jimmy Shah wrote in a previous blog post, Bouncer has not been enough to keep all […]

Read more ...

We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the supposed statement from the German Chancellor regarding the protests in Lhasa, Tibet. The From field indicates that it came from a key officer from the ATC or Australian Tibet […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks