The Latest in IT Security

Posts Tagged ‘vulnerable computers’

The last time we heard from Itzhak zuk Avraham, he was at Defcon 2011 showing off an Android app that let even inexperienced users poke around networks for weak links and vulnerable computers. Now his company, Zimperium, is rolling out a new mobile intrusion protection app (or zIPS, for short) to help users figure out […]

Read more ...

Java exploits represent a common attack vector used by the bad guys to infiltrate vulnerable computers via the web browser. We wrote about the rise of Java exploits as early as 2010, and we haven’t seen that trend decline. In fact, in the first quarter of 2013 alone, we’ve seen three Java remote code execution […]

Read more ...

2012 is a website that has focused on publishing information about freedom of speech, cryptography, spying, and surveillance. In many ways, Cryptome is similar to Wikileaks – except it has been operating since 1996. The site is run by a New York -based architect called John Young. Cryptome has just announced it has been hacked. […]

Read more ...


TUESDAY, JULY 07, 2020

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments