The Latest in IT Security

Posts Tagged ‘Smartphones’

Apart from those apps that register users for unwanted services and those that aggressively push ads, Android users should also worry about apps with backdoor capabilities.While premium service abusers and adware accounted for the majority of malicious apps in 2012, they are, however, not the only threats to Android. Reports of a botnet running on […]

Read more ...

13
Sep
2012

Ten years ago, one of the largest Linux worm outbreaks was underway. Known as Slapper, this worm would infect Linux machines via an OpenSSL vulnerability. Infected Linux servers were organized into a P2P network which could then be used to launch DDoS attacks. Although Slapper was not the first Linux worm (at least ADMworm and […]

Read more ...

It's been a while since we looked at the Android malware space (I think the last one was here), so when someone asked about it yesterday, I pulled up some log traffic to take a look. It looks like Russia and China continue to be hotbeds for unofficial app download sites, where you're definitely taking […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments