Kategorie
BlackBerry Introduces New Products And Services
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Kategorie: Hacking & Security
Entrust Integrates Biometric Fingerprint Authentication
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Kategorie: Hacking & Security
Mt. Gox Bitcoin Meltdown: What Went Wrong
Transaction malleability attacks and cold-storage software bugs both cited after nearly $500 million worth of bitcoins vanish
Kategorie: Hacking & Security
Messaging App Wickr Secures $9M+ From World's Leading VCs, Entrepreneurs, Hackers And Feds
Wickr is an encrypted, self-destructing messaging app, serving more than 1 million messages each day
Kategorie: Hacking & Security
Security Firms Face Crisis Of Trust
Mikko Hypponen reflects on shift toward rampant government spying and use of malware -- and targeted attack attempts on F-Secure
Kategorie: Hacking & Security
Cisco And NineSigma Announce $300,000 Grand Challenge To Secure Internet Of Things
Cisco is seeking solutions for malware defense, security credential management, and privacy protection
Kategorie: Hacking & Security
Malware-Lobbing Hackers Seize 300,000 Routers
Hackers launch scam and malware campaigns after compromising a variety of routers running firmware with known vulnerabilities
Kategorie: Hacking & Security
Researchers Create Legal Botnet Abusing Free Cloud Service Offers
Hack depends on scripts creating scores of unique email addresses and automating execution of email verification
Kategorie: Hacking & Security
Feds Look To Big Data On Security Questions
Government IT leaders believe continuous monitoring and advanced analytics can help agencies better understand their networks and security
Kategorie: Hacking & Security
Hacking Critical Infrastructure Companies -- A Pen Tester's View
At the RSA Conference, a penetration tester outlines some of the elements of a successful attack on energy companies
Kategorie: Hacking & Security
Supply-Chain Threats Still An Uncertain Danger
With a global manufacturing economy muddying the definition of a foreign product, nations are still hashing out strategies to secure their supply chains
Kategorie: Hacking & Security
Fewer Than Half Of IT Pros At RSA Conference Say NSA Went Too Far
Spying revelations and document leaks a big theme at RSA Conference 2014, but views on the controversy are split
Kategorie: Hacking & Security
Less Than Half Of IT Pros At RSA Conference Say NSA Went Too Far
Spying revelations and document leaks a big theme at RSA Conference 2014, but views on the controversy are split
Kategorie: Hacking & Security
Today's Network Security Challenges: No Easy Answers
The BYOD trend and proliferation of mobile devices are making life hard for security teams, but solutions are elusive, panelists say at RSA Conference 2014
Kategorie: Hacking & Security
Mobile Malware Evolution: Three Infection Attempts Per User In 2013
Nearly 145,000 new malicious programs for mobile devices were detected in 2013
Kategorie: Hacking & Security
SAS For Windows Buffer Overflow Leads To Code Execution
Vulnerabilities were discovered in a routine security crash
Kategorie: Hacking & Security
Qualys Introduces Continuous Monitoring Cloud Service For Global Perimeters
QualysGuard Cloud Platform available immediately in beta for all customers
Kategorie: Hacking & Security
TraceSecurity Enhances TraceCSO To Simplify IT GRC Management
Customers will see improvements in key features, new functionality, and other enhanced performance metrics
Kategorie: Hacking & Security
Tufin Unveils Tufin Orchestration Suite Version R14-1
Company also announces integration with IT automation leader Puppet Labs
Kategorie: Hacking & Security
Catbird Partners With Trapezoid
Combined solution will leverage Trapezoid Marker to meet 24 FISMA controls
Kategorie: Hacking & Security
- « první
- ‹ předchozí
- …
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- následující ›
- poslední »
