Introducing the Mobile-Friendly Test API

  • in Blog Posts
  • by
  • January 31, 2017
  • Comments Off on Introducing the Mobile-Friendly Test API

With so many users on mobile devices, having a mobile-friendly web is important to us all. The Mobile-Friendly Test is a great way to check individual pages manually. We’re happy to announce that this test is now available via API as well. The Mobile-Friendly Test API lets you test URLs Continue Reading

Microsoft Windows Server 2003 End Of Life, What’s Next?

  • in Blog Posts
  • by
  • January 30, 2017
  • Comments Off on Microsoft Windows Server 2003 End Of Life, What’s Next?

Windows Server 2003, along with its R2 update, has gained huge popularity in IT circles since its release over 10 years ago. Within 10 years of the release, the product was used by around 20 million servers worldwide. However, the product reached its end of life on July 14, 2015. Continue Reading

Red Hat Assists Monash University with Deployment of Software-Defined Storage to Support Advanced Research Capabilities

  • in Blog Posts
  • by
  • January 30, 2017
  • Comments Off on Red Hat Assists Monash University with Deployment of Software-Defined Storage to Support Advanced Research Capabilities

RALEIGH, N.C. — January 30, 2017 — Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced that Monash University, one of Australia’s most prestigious research universities, has implemented a massive multi-petabyte deployment on Red Hat Ceph Storage. One of our key concerns in this Continue Reading

CISO Customer Panel – Accelerate 2017

  • in Blog Posts
  • by
  • January 29, 2017
  • Comments Off on CISO Customer Panel – Accelerate 2017

I recently wrote about the general sessions held on the first day of Accelerate. There was so much great information presented that I couldn’t do justice to it in the general overview I posted of the morning’s events. So I wanted to take a few minutes and provide some deeper Continue Reading

Multiple XSS Vulnerabilities Discovered In IBM Infosphere BigInsights

  • in Blog Posts
  • by
  • January 29, 2017
  • Comments Off on Multiple XSS Vulnerabilities Discovered In IBM Infosphere BigInsights

Summary Last year, I discovered and reported two Cross-Site Scripting (XSS) vulnerabilities in IBM’s Infosphere BigInsights. This week, IBM released a security bulletin which contains the fix for these vulnerabilities. CVE numbers CVE-2016-2924 and CVE-2016-2992 are assigned to them respectively. InfoSphere BigInsights is an analytics platform for analyzing massive volumes Continue Reading

Fortinet at HIMSS 2017: Two Sessions to Attend

  • in Blog Posts
  • by
  • January 29, 2017
  • Comments Off on Fortinet at HIMSS 2017: Two Sessions to Attend

Last March, Fortinet team members joined more than 40,000 HIMSS16 attendees in Las Vegas to discuss the latest trends and developments in healthcare information technology. While the 2016 event featured a number of fascinating exhibits and sessions, it will likely be remembered as the year healthcare security hit a critical Continue Reading

Microsoft Mechanics show features software-defined networking with Windows Server 2016

  • in Blog Posts
  • by
  • January 28, 2017
  • Comments Off on Microsoft Mechanics show features software-defined networking with Windows Server 2016

Take a coffee break and watch our new 10-minute video on software-defined networking with Windows Server 2016. Join Windows Server program manager Greg Cusanza as he demonstrates how you can use software-defined networking (SDN) to dynamically create, secure and connect your network to: Meet the evolving needs of your applications Continue Reading

WordPress 4.7.2 Security Release

  • in Blog Posts
  • by
  • January 28, 2017
  • Comments Off on WordPress 4.7.2 Security Release

WordPress 4.7.2 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately. WordPress versions 4.7.1 and earlier are affected by three security issues: The user interface for assigning taxonomy terms in Press This is shown to users who do Continue Reading

Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java

  • in Blog Posts
  • by
  • January 28, 2017
  • Comments Off on Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java

In part I of this blog we finished the analysis of the native layer and got the decrypted secondary dex file. Here in part II we will continue to analyze it. For the sake of continuity, we will maintain continuous section and figure numbers from part I of the blog. IV. The secondary Continue Reading

Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer

  • in Blog Posts
  • by
  • January 28, 2017
  • Comments Off on Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer

Recently, we found a new Android rootnik malware which uses open-sourced Android root exploit tools and the MTK root scheme from the dashi root tool to gain root access on an Android device. The malware disguises itself as a file helper app and then uses very advanced anti-debug and anti-hook Continue Reading

Page 1 of 812345...Last »