You’ve heard of the “Internet of Things” – but surely the “things” are just computers, and the “internet of things” is just, well, the internet? Source: Sophos
You’ve heard of the “Internet of Things” – but surely the “things” are just computers, and the “internet of things” is just, well, the internet? Source: Sophos
In an earlier newsletter (March 2015), we talked about Macro viruses and that it was making a comeback. In it we stated that, “A macro virus is a computer virus that replaces a macro. A macro is basically a single instruction that expands automatically into a set of instructions to perform a particular task. In […]
In early October, it was announced that a critical vulnerability had been found in the libutils library. The libutils library is part of Android OS; it implements various primitive elements that can be used by other applications. The least harmful result that exploiting this vulnerability could lead to is the software that uses the stagefright […]
In early October, it was announced that a critical vulnerability had been found in the libutils library. The libutils library is part of Android OS; it implements various primitive elements that can be used by other applications. The least harmful result that exploiting this vulnerability could lead to is the software that uses the stagefright […]
According to the old Chinese saying, the journey of a thousand miles begins with one step. And our path to revealing large-scale theft of VKontakte users’ personal data began with an email from a user asking us to take a look at a suspicious app. At first glance, the VK Music app only displayed legitimate […]