Cyber-spies are targeting Mongolian businesses and government agencies to keep the attackers “aware” of the land-locked country’s relationships with “Western influences” like the US and the European Union, according to a recent report.
Browsing: Malware and Vulnerabilities
When it comes to building secure mobile applications, errors most often occur in session management. By themselves, these mistakes do not present a significant risk, but the more mistakes made, the more vulnerable the application.
Russian authorities have arrested a man believed to be the creator of the malicious software kit Blackhole.
If you’re a security professional who’s regularly telling IT and the business side what they’re doing wrong with security, you’re doing it wrong.
Cybercriminals typically steal data using a triad of techniques–malware, hacking, and tampering with hardware.
There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less confidence with the IPv6 protocols than with their IPv4 counterpart
When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the grid?
London, UK (7 October 2013) – According to DOSarrest Internet Security, findings by its Vulnerability Testing and Optimisation service (VTO) of deep website scans, ninety percent of websites are vulnerable to attack.
Several statistics gathering engines on the web reveal an interesting picture. Content management systems (CMS) have become far more popular in the last couple of years.