The Latest in IT Security

Posts Tagged ‘Threat’

There’s been a recent development in the threat environment around the Remote Root Vulnerability in HID Door Controllers that we wanted to alert customers to. You might recall on March 30, 2016, our Zero Day Initiative published an advisory around a vulnerability that Ricky “HeadlessZeke” Lawshae with our DVLabs group discovered. This was for a […]

Read more ...

Android’s recent API modifications have hampered some malware’s ability to determine which application is currently running in the foreground of a device at any given point of time. As Android begins to successfully block this attack method, attackers may adopt a trick used by adware so that their threats can work again. Though we have […]

Read more ...

The popular and sometimes controversial Shodan search engine made some changes recently that drew attention mostly of the latter variety. If you are not familiar with Shodan, it is the self-proclaimed “first search engine for Internet-connected devices” providing information about the connectedness of everything from refrigerators to power plants. The new capability at Shodan that […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments