The Latest in IT Security

Posts Tagged ‘trickery’

According to our friends at Commtouch, malware using Right to Left Override (RLO) Unicode tricks have “resurfaced extensively in the past week”. Unicode character (U+202E) “reverses” text for languages that are traditionally read from right to left, and it’s a feature that can be used to obfuscate file names.We examined a sample a few days […]

Read more ...

Firefox 6 is out. This is the second under Firefox’s new ‘single-line railway track with regular stations’ development and release regimen. Like last time, when Version 5 came out on the mid-year solstice, the official release appeared spot on target: 17 August on the Eastern side of the world, and 16 August in Mozilla’s timezone. […]

Read more ...

Bilocating technology blogger Mark Maunder – he claims to live in Seattle and Cape Town concurrently, though I suspect he means consecutively, and I’ll wager he wisely avoids winter in both of them – recently wrote about an intrusion to his WordPress site. It turns out the backdoor was a previously-unexploited, or at least a […]

Read more ...


Categories

SATURDAY, APRIL 27, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments