Russian authorities have arrested a man believed to be the creator of the malicious software kit Blackhole.
Browsing: Malware and Vulnerabilities
If you’re a security professional who’s regularly telling IT and the business side what they’re doing wrong with security, you’re doing it wrong.
Cybercriminals typically steal data using a triad of techniques–malware, hacking, and tampering with hardware.
There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less confidence with the IPv6 protocols than with their IPv4 counterpart
When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the grid?
London, UK (7 October 2013) – According to DOSarrest Internet Security, findings by its Vulnerability Testing and Optimisation service (VTO) of deep website scans, ninety percent of websites are vulnerable to attack.
Several statistics gathering engines on the web reveal an interesting picture. Content management systems (CMS) have become far more popular in the last couple of years.
In an important customer announcement published yesterday, Adobe notified customers that its network had been breached, and the attackers illegally accessed information relating to 2.9 million Adobe customers
(INFOGRAPHIC) Web applications are inherently insecure due to vulnerabilities that are hard to patch and easy to exploit.