The Latest in IT Security

Posts Tagged ‘stranger’

A Russian security researcher has earned himself a tidy $60,000 by demonstrating how he could waltz past the security sandbox in Google’s Chrome browser to run unauthorised code on fully-patched Windows 7 computers. Sergey Glazunov uncovered a remote code execution vulnerability in Chrome, that could be used by malicious hackers and cybercriminals to install and […]

Read more ...

Internet users are receiving emails claiming to contain a changelog – but the files attached are really designed to infect computers. Here’s what a typical email looks like, although the precise wording can vary. Subject: Re: Your Changelog Message body: Good day, as promised chnglog attached (Open with Internet Explorer) The subject lines and attachment […]

Read more ...

Apple’s new “Siri” feature, the voice-activated personal assistant built into the iPhone 4S, leaves owners’ spanking new smartphones partially unguarded. Those of us who work in the security arena have often banged on about the importance of securing your smartphone with a password or passcode to prevent unauthorised access. Most mobile phone manufacturers have recognised […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments