The Latest in IT Security

Posts Tagged ‘six weeks’

We've been busy in the labs reverse engineering the various components of OSX.Flashback.K to determine the true motivation behind the malware. Let's take a look at this Mac Trojan in more detail. The Infection It's now well-known that the latest OSX.Flashback.K variant was being distributed using the Oracle Java SE Remote Java Runtime Environment Code […]

Read more ...

We, like most in the security community, have been following the latest developments with the Mac OS X Flashback Trojan and it’s exploitation of the recently patched Java vulnerability (CVE-2012-0507).  This story has a lot of interesting twists and turns: The Flashback Trojan is a relatively new Trojan family, appearing on the scene late last summer/early September […]

Read more ...

New spam regulations, introduced in India, limit the users of mobile phones to sending only 100 texts per day. The reason? To stop the growing problem of SMS text spam. Cellphone usage is huge in India, with more than 700 million subscribers. But with that popularity comes the problem of users being constantly plagued with […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments