The Latest in IT Security

Posts Tagged ‘technical details’

Our Threat Solutions team discovered an interesting threat using a novel “infection vector” for Android today. Back in July, they analyzed Spyware:Android/SndApps, which, after an update, is able access various bits of personal information. Before the update, it only requests the “Internet” permission. It seems probable to us that users are less likely to carefully […]

Read more ...

Facebook Likejacking Prevention is the second plug-in that I’ve released for multiple browsers (Google Chrome, Safari and Firefox). It is technically much more complex than the previous one, Zscaler Safe Shopping. Each browser offered different challenges. As promised in the previous blog post, I will provide details of what was required to port the plugin […]

Read more ...

The internet is abuzz with news that beleagured security company RSA, which suffered a security intrusion and theft of trade secrets back in March, is offering to replace its customers’ security tokens. Security tokens are used in two-factor authentication to add additional strength to conventional username and password logins. The simplest sort of token generates […]

Read more ...


Categories

FRIDAY, APRIL 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments