The Latest in IT Security

Posts Tagged ‘that takes advantage’

Our mobile security research team has found at least 33 applications that contain aggressive advertising components in the official Google PlayTM store. The developers of these applications choose to imitate well-known companies like GoogleTM, MicrosoftTM, TwitterTM, AVGTM among others. Here’s an example of some applications found in Google Play: This developer is very creative – […]

Read more ...

Wecykler is a family of worms, that shares some similarities with the Worm:Win32/Autorun family, in that it that takes advantage of removable drives attached to an infected system in order to propagate to other machines. They target users’ familiarity with the content of drives (files and directories) disguising as directories with existing and catchy names […]

Read more ...


Categories

WEDNESDAY, DECEMBER 11, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments