The Latest in IT Security

Posts Tagged ‘Source Code’

In 2011, Blackhat SEO links were pretty much absent from the most popular searches in Google. Instead, Blackhat SEO was used to target more specific searches. The technique heavily used to poison the searches for buying software online with hundreds of fake online stores. Blackhat SEO Things are starting to change in 2012. I ran […]

Read more ...

I’ve released my first add-on for Internet Explorer and I’ve almost finished a second one. Developing for Internet Explorer was a very different experience than developing for the other browsers I’ve worked with before – Firefox, Firefox Mobile, Google Chrome, Safari and Opera. Overall Architecture Internet Explorer extensions are called Browser Helper Objects (BHO). They […]

Read more ...

The Android Market was just recently renamed to Google Play and yet there are already cybercriminals taking advantage of this. We’ve spotted newly created domains that imitate the Google Play site and contain malicious apps. The malicious URL http://{BLOCKED}ay-google.ru displays a fake Russian Google Play site. When translated to English, the text reads: ” Download […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments