Security requirements
Find the technical reqiremehs here as an ZIP-document for download.
Please try the following options:
Your search resulted in 1928 hits.
Security requirements
Find the technical reqiremehs here as an ZIP-document for download.
Let’s set ice on fire: Hunting and detecting IcedID infections
Emotet ist dead. IcedID belongs to the contenders to take its place. This is how you hunt for samples and detect local infections.
LOLSnif – Tracking Another Ursnif-Based Targeted Campaign
Cybersecurity: Tool leaks are very interesting occurrences in cyber security. In his new blog post, Thomas Barabosch analyze a newer version of Ursnif.
Dangers of Dynamic Data Exchange (Windows)
A small feature in MS Office apps can be used to install malware. See Microsoft Security Advisory 4053440 details how to disable DDE completely, or at least how to minimize the effect of malicious documents.
No more cash – MyWallet turns your smartphone into a wallet
The app, the digital payment card and an NFC sticker now are available for contactless mobile payment in Germany.
Devices that support the A5/3 encryption standard
Stand: 12/2013
Manufacturer Phone models
Alcatel 1010
Alcatel 2001
Alcatel 2005
Alcatel 2010
Alcatel ONE TOUCH 209
Alcatel ONE TOUCH 228
Alcatel ONE TOUCH 305
Alcatel ONE TOUCH 806
Alcatel ONE TOUCH 908 (Move)
Alcatel ONE...
Report Data Privacy and Data Security 2011
Report Data Privacy and Data Security 2011 of Deutsche Telekom to download.
Mobile Navigation
High-performance solution from T-Mobile and NAVIGON.