As President Obama readies to strike the Syrian regime, it’s worth thinking about that other defense problem–cybersecurity–and what it says about Washington in the Obama era.
Browsing: Malware and Vulnerabilities
94.7 percent of Americans received at least one email containing a virus, spyware, or malware, according to Halon. About one in eleven (8.8%) opened the attachment and infected their computer.
When we discuss exploit prevention, we often talk about ‘targeted applications.’ This term refers to end-user applications which can be exploited by hackers for malicious purposes. There are a few requirements that define these applications.
Joseph Sokoly is a Vulnerability Engineer at MAD Security who is recognized as an emerging thought leader in the security field, and a regular at community-based gatherings like Security BSides.
GlobalSign, a Certificate Authority (CA) focused on solutions for enterprises, today launched a new solution that integrates with Windows Active Directory and allows enterprises to automate the enrollment, provisioning and management of GlobalSign digital certificates for Windows environments.
Stories in this blog’s Breadcrumbs series have sought to comb through clues that point to the possible location and identities of malware authors and purveyors.
Reports of an active exploit targeting an unpatched vulnerability in Java 6 recently surfaced. Upgrading to the latest version of Java is the prescribed solution, though for some users, this is easier said than done.
Appthority and AirWatch announced that AirWatch EMM is integrated with Appthority’s fully automated App Risk Management service for app analysis and risk management.
Leaving your old PC in a public space may seem like a sure-fire way to make it someone else’s old PC. But if you take the time to secure it properly, you can get a lot of mileage out of turning it into a dedicated public-access machine.
The key to improving a web security program is having a comprehensive metrics program in place – a system capable of performing ongoing measurement of the security posture of production systems, exactly where the proverbial rubber meets the road.