When we discuss exploit prevention, we often talk about ‘targeted applications.’ This term refers to end-user applications which can be exploited by hackers for malicious purposes. There are a few requirements that define these applications.
Author: ISBuzz Team
Google Play has been forced to remove a Boyfriend Tracker app from sale in Brazil in response to complaints about privacy abuses, as well as its potential to be used for extortion or stalking.
The U.S. government’s efforts to determine which highly classified materials leaker Edward Snowden took from the National Security Agency
Joseph Sokoly is a Vulnerability Engineer at MAD Security who is recognized as an emerging thought leader in the security field, and a regular at community-based gatherings like Security BSides.
There has been a recent surge in security blogs warning users to be extra cautious of a new spin on an old threat.
GlobalSign, a Certificate Authority (CA) focused on solutions for enterprises, today launched a new solution that integrates with Windows Active Directory and allows enterprises to automate the enrollment, provisioning and management of GlobalSign digital certificates for Windows environments.
Thinking of going freelance but not sure if it’s for you? Here are a few things that I think are worth considering before you take the plunge.
Stories in this blog’s Breadcrumbs series have sought to comb through clues that point to the possible location and identities of malware authors and purveyors.
More than 9 million adults in Britain have had online accounts hacked and 8% of the population say they have lost money in the past year because of cybercrime, according to a survey by university researchers.
Reports of an active exploit targeting an unpatched vulnerability in Java 6 recently surfaced. Upgrading to the latest version of Java is the prescribed solution, though for some users, this is easier said than done.