Tag Archive for: applications

App Lock locks your applications with a pass code to prevent intruders. – MyWabashValley

App Lock locks your applications with a pass code to prevent intruders.
MyWabashValley
Android Device Manager is a built-in anti-theft service found on most Google-enabled Android devices. You access it via a website. You'll want to enable this app. Ghostery Browser lets you block website trackers if need be. DuckDuckGo Search is popular …

“android security” – read more

Thousands of Java applications vulnerable to nine-month-old remote code execution exploit

A popular Java library has a serious vulnerability, discovered over nine months ago, that continues to put thousands of Java applications and servers at risk of remote code execution attacks.

The flaw is located in Apache Commons, a library that contains a widely used set of Java components maintained by the Apache Software Foundation. The library is used by default in multiple Java application servers and other products including Oracle WebLogic, IBM WebSphere, JBoss, Jenkins and OpenNMS.

The flaw is specifically in the Collections component of Apache Commons and stems from unsafe deserialization of Java objects. In programming languages, serialization is the process of converting data to a binary format for storing it in a file or memory, or for sending it over the network. Deserialization is the reverse of that process.

To read this article in full or to leave a comment, please click here

Network World Security

Under one percent of Android devices affected by potentially harmful applications

Based on data collected by Google, less than one percent of Android devices had a potentially harmful application installed last year. This includes devices on which users have installed applications from outside the official Google Play store.

The data was collected through a feature called Verify Apps that was first introduced in Android 4.2 back in 2012. The feature, which was also backported to Android 2.3 and higher in 2013, checks locally installed applications for potentially harmful behavior regardless of whether they were downloaded from Google Play or other sources.

Verify Apps initially scanned applications only at installation time, but since March 2014 it also performs background scans, so it can later detect malicious applications that weren’t flagged when they were initially installed.

To read this article in full or to leave a comment, please click here

Network World Security

2013 “Annual Computer Security Applications Conference” Addresses … – Marketwired (press release)

2013 "Annual Computer Security Applications Conference" Addresses
Marketwired (press release)
WASHINGTON, DC–(Marketwired – Sep 30, 2013) – The attacks and hacks on today's digital networks have become more insidious and pervasive by the day; and they also threaten the physical systems and critical infrastructure that they interconnect and run 

“computer security” – read more