After years and years of headlines and statistics about Android security and malware, ranging from questionable statistics to outright bs,…
Browsing: Malware and Vulnerabilities
How does group policy work? Group policy is Microsoft’s core infrastructure for managing the configuration of both users and computers…
The new opportunistic encryption feature in Firefox, Mozilla has had to disable it because of a security vulnerability in the browser’s…
A new and alarming TLS/SSL vulnerability was discovered – FREAK. The vulnerability allows for a “man in the middle” attack…
Vulnerabilities a Pathway for Robbery, Theft of Sensitive Information or Stalking Veracode, a leader in protecting enterprises from today’s pervasive…
The Trojan Dyre (also known as Dyreza) has been around for quite awhile now, terrorizing the banking industry, stealing passwords…
Venafi, the leading provider of Next-Generation Trust Protection, today announced new research reevaluating the risk of attacks that exploit incomplete…
Richard Blech and Philip Lieberman commented on news from IBM , in which senior threat researcher John Kuhn blogged that…
TK Keanini, CTO of Lancope, had the following reaction to the new CompTIA security readiness study.
Fitness trackers of all kinds have become extremely popular, helping people to manage their physical activity and calorie intake and…