The Latest in IT Security

Posts Tagged ‘timeline’

Recently, security researchers disclosed two Java native layer exploits (CVE-2013-2465 and CVE-2013-2471). This caused us too look into native layer exploits more closely, as they have been becoming more common this year. At this year’s Pwn2Own competition at CanSecWest, Joshua Drake showed CVE-2013-1491, which was exploitable on Java 7 running on Windows 8. CVE-2013-1493 has […]

Read more ...

Scam Message: Perfect Way to find who all are crawling my photos-> Scam Type: Browser Exploit, Profile Viewer Trending: December 2012 Why it’s a Scam: Clicking the scam link takes you to the following landing page: When you click the “Get Your Activation Code” button you are basically creating a login token for your Facebook […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments