The Latest in IT Security

Posts Tagged ‘timeline’

Thanks to Peter Coogan for his assistance with this research.Earlier this week Mandiant released a blog which talked about a new advanced persistent threat (APT) they found  while investigating a potential compromise. Symantec detects the APT in question as Backdoor.Hikit, a Trojan that enables an attacker to gain control of compromised servers from a remote […]

Read more ...

Scam  Message:Facebook Profile ViewerScam Type:  Rogue Application, Survey Scam, Profile ViewerTrending: August 2012Why it’s a Scam:Clicking the wall post link takes you to the following anding page:You are further directed to the traditional app installation screen:As if the above application permissions weren’t enough, once you proceed the application requests even more access to your Facebook account:Clicking […]

Read more ...

Last month, we saw a new Java vulnerability (CVE-2012-1723) being used by malware. This new Java vulnerability is a type-confusion, same as the notorious CVE-2012-0507 AtomicReferenceArray vulnerability. The vulnerability was resolved on June 12th by Oracle and a discussion on the vulnerability was made public on June 13th (though some security updates had appeared in […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments