Google’s bold claims that Android doesn’t have a malware problem and is more secure than Apple’s iOS have singularly failed to convince security researchers.
Browsing: Malware and Vulnerabilities
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.
Security firm Imperva revealed that more than 35000 websites based on vBulletin CMS have been hacked exploiting a known vulnerability.
Gartner last month released its “Five styles of Advanced Threat Defense” framework which attempts to update a layered defence model for enterprises to be able to protect against APTs or ATAs.
LONDON, UK — October 17, 2013 — Tripwire, today announced that Dwayne Melancon, CTO for Tripwire, will moderate a panel discussion at RSA Conference Europe 2013.
We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s also interesting to turn the cliché on its head.
In a rather shrewd move, Google has said it will provide Chrome updates for Windows XP users for at least a year after Microsoft stops supporting the elderly OS next April.
As a penetration tester and long-time security professional, Sumit ‘Sid’ Siddharth is a big believer in the importance of practicing exploitation to gain better insight about vulnerabilities.
There is a perception by many organisations that their internal network is a relatively safe haven from attackers.
In a new blog post from Scott Greaux, VP of PhishMe, the ways organisations can use metrics to measure and improve security is discussed.