Zero-day (zero-hour or day zero) vulnerabilities are previously unknown vulnerabilities that have not been revealed publicly but are exploited by attackers. Discovering and exploiting zer
Month: October 2012
I ran across a really good high-level Enterprise Architecture video last week and thought I would share. It’s brought to us by ArchimateMusings blog. This looks to be a video that his company
In March a new type of financial attack on Android devices was found targeting customers of several banks in Europe. Dubbed FakeToken, one of the principal differences of this new threat–comp