After years and years of headlines and statistics about Android security and malware, ranging from questionable statistics to outright bs, Google finally fired back with some hard numbers through a report titled “Android Security State of the Union 2014”.
Author: ISBuzz Team
CNN reported that Russia was behind last year’s State Department and White House hacks.
How does group policy work? Group policy is Microsoft’s core infrastructure for managing the configuration of both users and computers in an enterprise windows forest.
The new opportunistic encryption feature in Firefox, Mozilla has had to disable it because of a security vulnerability in the browser’s implementation of the HTTP Alternative Services specification. Here to comment on this news is Russ Spitler, VP of product strategy for AlienVault.
A new and alarming TLS/SSL vulnerability was discovered – FREAK. The vulnerability allows for a “man in the middle” attack by tricking the user and the server into accepting a weak version of HTTPS encryption.
Vulnerabilities a Pathway for Robbery, Theft of Sensitive Information or Stalking Veracode, a leader in protecting enterprises from today’s pervasive Web and mobile application threats, released a report finding that the foundation of the Internet of Things (IoT) – the devices themselves plus their associated mobile applications and cloud services – are often not designed with data security or privacy in mind, putting consumers at risk for cyberattack or physical intrusion of their homes.
Venafi, the leading provider of Next-Generation Trust Protection, today announced new research reevaluating the risk of attacks that exploit incomplete Heartbleed remediation in Global 2000 organisations in the UK.
More and more organisations deploy their own private cloud to increase data security, flexibility and efficiency. For years, technology evangelists have lobbied hard to get the public to believe in cloud technology.
Richard Blech and Philip Lieberman commented on news from IBM , in which senior threat researcher John Kuhn blogged that The Dyre Wolf malware has been used to steal more than $1 million from businesses within the past month and the attacks involve sophisticated social engineering.
TK Keanini, CTO of Lancope, had the following reaction to the new CompTIA security readiness study.