Topic: vulnerabilities

Majority of Android vulnerabilities are due to lack of security updates

A team of researchers from the University of Cambridge have discovered that about 87% of Android vulnerabilities are due to a lack of security updates from manufacturers. The researchers used a device analyzer app they created to get statistics from more than 20,000 devices. With the data they collected, they rated each device manufacturer based … continue reading

SD Times Blog: x86 exploit released

Your teams have taken a lot of time to ensure your super secret systems are super secret, right? Thanks to Black Hat 2015, all that work to prove a system is secure and reliable is going to have to be redone. Christopher Domas, security researcher at the Battelle Memorial Institute, metaphorically dropped the mic and … continue reading

Mozilla blocks Flash in Firefox

More and more tech companies are piling on the “Occupy Flash” movement as Adobe’s Flash Player continues to be beset by publicly known security vulnerabilities. Mark Schmidt, Mozilla’s head of Firefox support, tweeted that the company has officially blocked Flash in all versions of Mozilla Firefox. He clarified that the block will only remain in … continue reading

NativeScript public beta, Adobe’s approach to flaw detection, and Django REST framework 3.1—SD Times news digest: March 6, 2015

It has been almost a year since Telerik announced its cross-platform framework for Android, iOS, and Windows. Today, that NativeScript framework is finally making it into public beta. Valentin Stoychev, product line manager at Telerik, announced that developers can start using the framework to build native mobile apps with CSS and JavaScript. “We have been … continue reading

SD Times news digest: September 9, 2014—Weave virtual Docker network, Java and C++ popularity hit lows

Weave: The virtual Docker network London-based developer Zettio has open-sourced Weave, a tool to create a virtual network that connects Docker containers across multiple hosts. Weave creates a network bridge on each host, connecting each container to the bridge via a veth pair (a pair of virtual network interfaces connected together). Weave routers then capture … continue reading

DMCA.com Protection Status