When we discuss exploit prevention, we often talk about ‘targeted applications.’ This term refers to end-user applications which can be exploited by hackers for malicious purposes. There are a few requirements that define these applications.
Browsing: Identity and Access Management (IAM)
GlobalSign, a Certificate Authority (CA) focused on solutions for enterprises, today launched a new solution that integrates with Windows Active Directory and allows enterprises to automate the enrollment, provisioning and management of GlobalSign digital certificates for Windows environments.
Appthority and AirWatch announced that AirWatch EMM is integrated with Appthority’s fully automated App Risk Management service for app analysis and risk management.
Were you trying to access a .cn Internet address over the weekend? Are you still hitting refresh?
The latest victim of the Syrian Electronic Army is ShareThis.com, the popular sharing platform. ShareThis is only the latest in a long line of Internet companies targeted by the hacktivists.
Leaving your old PC in a public space may seem like a sure-fire way to make it someone else’s old PC. But if you take the time to secure it properly, you can get a lot of mileage out of turning it into a dedicated public-access machine.
It only took one attack last week, but it was enough to allow the Syrian Electronic Army (SEA) to compromise The Washington Post, CNN and Time.
Gaming Companies, and especially those who provide a cloud service for either online play or account management are a great and very compelling target for attackers.
A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release – attacking dozens of Fortune 1000 firms.
Mauritania Attacker leaked thousand of twitter Accounts credentials today, which was hijacked from twitter.