Introducing the Mobile-Friendly Test API

  • in Blog
  • by
  • 1월 31, 2017
  • Introducing the Mobile-Friendly Test API에 댓글 닫힘

With so many users on mobile devices, having a mobile-friendly web is important to us all. The Mobile-Friendly Test is a great way to check individual pages manually. We’re happy to announce that this test is now available via API as well. The Mobile-Friendly Test API lets you test URLs Continue Reading

Microsoft Windows Server 2003 End Of Life, What’s Next?

  • in Blog
  • by
  • 1월 30, 2017
  • Microsoft Windows Server 2003 End Of Life, What’s Next?에 댓글 닫힘

Windows Server 2003, along with its R2 update, has gained huge popularity in IT circles since its release over 10 years ago. Within 10 years of the release, the product was used by around 20 million servers worldwide. However, the product reached its end of life on July 14, 2015. Continue Reading

Red Hat Assists Monash University with Deployment of Software-Defined Storage to Support Advanced Research Capabilities

  • in Blog
  • by
  • 1월 30, 2017
  • Red Hat Assists Monash University with Deployment of Software-Defined Storage to Support Advanced Research Capabilities에 댓글 닫힘

RALEIGH, N.C. — January 30, 2017 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that Monash University, one of Australia’s most prestigious research universities, has implemented a massive multi-petabyte deployment on Red Hat Ceph Storage. One of our key concerns in this Continue Reading

CISO Customer Panel – Accelerate 2017

  • in Blog
  • by
  • 1월 29, 2017
  • CISO Customer Panel – Accelerate 2017에 댓글 닫힘

I recently wrote about the general sessions held on the first day of Accelerate. There was so much great information presented that I couldn’t do justice to it in the general overview I posted of the morning’s events. So I wanted to take a few minutes and provide some deeper Continue Reading

Multiple XSS Vulnerabilities Discovered In IBM Infosphere BigInsights

  • in Blog
  • by
  • 1월 29, 2017
  • Multiple XSS Vulnerabilities Discovered In IBM Infosphere BigInsights에 댓글 닫힘

Summary Last year, I discovered and reported two Cross-Site Scripting (XSS) vulnerabilities in IBM’s Infosphere BigInsights. This week, IBM released a security bulletin which contains the fix for these vulnerabilities. CVE numbers CVE-2016-2924 and CVE-2016-2992 are assigned to them respectively. InfoSphere BigInsights is an analytics platform for analyzing massive volumes Continue Reading

Fortinet at HIMSS 2017: Two Sessions to Attend

  • in Blog
  • by
  • 1월 29, 2017
  • Fortinet at HIMSS 2017: Two Sessions to Attend에 댓글 닫힘

Last March, Fortinet team members joined more than 40,000 HIMSS16 attendees in Las Vegas to discuss the latest trends and developments in healthcare information technology. While the 2016 event featured a number of fascinating exhibits and sessions, it will likely be remembered as the year healthcare security hit a critical Continue Reading

Microsoft Mechanics show features software-defined networking with Windows Server 2016

  • in Blog
  • by
  • 1월 28, 2017
  • Microsoft Mechanics show features software-defined networking with Windows Server 2016에 댓글 닫힘

Take a coffee break and watch our new 10-minute video on software-defined networking with Windows Server 2016. Join Windows Server program manager Greg Cusanza as he demonstrates how you can use software-defined networking (SDN) to dynamically create, secure and connect your network to: Meet the evolving needs of your applications Continue Reading

WordPress 4.7.2 Security Release

  • in Blog
  • by
  • 1월 28, 2017
  • WordPress 4.7.2 Security Release에 댓글 닫힘

WordPress 4.7.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.1 and earlier are affected by three security issues: The user interface for assigning taxonomy terms in Press This is shown to users who do Continue Reading

Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java

  • in Blog
  • by
  • 1월 28, 2017
  • Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java에 댓글 닫힘

In part I of this blog we finished the analysis of the native layer and got the decrypted secondary dex file. Here in part II we will continue to analyze it. For the sake of continuity, we will maintain continuous section and figure numbers from part I of the blog. IV. The secondary Continue Reading

Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer

  • in Blog
  • by
  • 1월 28, 2017
  • Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer에 댓글 닫힘

Recently, we found a new Android rootnik malware which uses open-sourced Android root exploit tools and the MTK root scheme from the dashi root tool to gain root access on an Android device. The malware disguises itself as a file helper app and then uses very advanced anti-debug and anti-hook Continue Reading

Page 1 of 812345...Last »
>