The smartphone market has never been so competitive. Since the iPhone reinvented the idea of what a smartphone could be in 2007, the choices available to the consumer have never been wider or more sophisticated.
Browsing: Malware and Vulnerabilities
The IT security market remains dominated by anti-malware vendors whose business model is based on the detection of new malware and selling subscription-based updates that block new malware as it is released.
Bromium was founded in 2010 with a mission to restore trust in computing.
Some hackers identify vulnerabilities – serving as the internet’s immune system – but new EU legislation fails to recognise their value, argues MEP
Secure Code Reviews (bringing someone in from outside of the team to review/audit the code for security vulnerabilities) and application Pen Tests (again, bringing a security specialist in from outside the team to test the system) are both important practices in a secure software development program.
The clock is ticking as web applications take center stage as the point of entry for malicious activity and development teams are asked to deliver new applications at breakneck speed.
Mobile network giant Telefonica has launched new business unit Eleven Paths, which promises unprovoked attacks on customers every day, in the interests of greater security.
Organizations Should Look for Ways to Involve Employees in Mitigating and Eliminating Threats Before they Happen…
Researchers say they have discovered a sophisticated trojan that targets Android smartphones – exploiting two previously unknown vulnerabilities in the mobile platform and a third flaw in separate software – to send text messages to premium-rate numbers and download other malware onto victims’ phones.
In the last year or so, we’ve seen significant growth in attacks on web servers, as opposed to the more traditional attacks on individual users.