ESET experts have caught the first example of an Android mobile Trojan, which they named Android/Simplocker.
Browsing: Malware and Vulnerabilities
Panda GateDefender eSeries includes robust, next-generation VPN technologies that enable fast and highly scalable VPN connections
You can see the manual analysis I did on a fresh sample unrelated to Gameover that arrived in my home email on June 1st.
OWASP has announced 4 world-renowned keynote speakers for AppSec Europe 2014 that takes place at Anglia Ruskin University in Cambridge, UK from 23-26 June
What if Mother Nature was the CISO? What strategy could she give the prey species so they could survive in the presence of many predators?
Remediating Heartbleed is a daunting task, but the good news is that use of orchestration tools, popular with DevOps, can make remediating this bug a lot easier.
The main conclusions of the study include the fact that malware creation has broken all records during this period, with a figure of more than 15 million
The messages contained a small Trojan downloader that installed the same spy program from the notorious Zeus/Zbot family.
DOSarrest, an industry leading DDoS protection provider, has announced a partnership agreement to offer its full suite of DDoS products to HOSTING
As Mark Kedgley, CTO, NNT asks, why are so many IT security experts intent on looking for footprints in the garden when the front door is wide open?