The Latest in IT Security

Posts Tagged ‘Shortcuts’

Recently released National Security Agency (NSA) emails show that the top digital spying group uses Word macros, widely considered a security risk. Word macros, programmable shortcuts in Microsoft Word, have been used in recent years to distribute ransomware, to launch attacks on credit card systems and even to black out the power grid of the […]

Read more ...

Android OS offers an interesting service known as Google Cloud Messaging, or GCM. This service allows small (up to 4 KB) messages to be sent via the Google server from their mobile devices in JSON format. These messages may contain any structured data, such as links, advertising information, or commands. In order to use this […]

Read more ...

In a recent post, AppAppeal ranked the most popular URL shorteners. The top five includes TinyURL,,, and Unfortunately, these helpful services are also used to hide a large number of malicious URLs. This result has made me want to learn more about malicious links that may be hidden behind these shortcuts.For […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments