Quantcast
Channel: Security Advancement
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Is Everything We Know About Password Stealing Wrong?

From Microsoft Research comes an interesting article about the viability of password stealing as a criminal business (in the context of committing financial fraud/theft). Here is a summary: Federal...

View Article



Image may be NSFW.
Clik here to view.

Two Critical Security Issues You Should Tackle Today

… if you haven’t already, that is. There has been a barrage of coverage lately addressing ongoing security issues with Java and Universal Plug-and-Play (UPnP). Summarizing a mountain of detail that is...

View Article

Image may be NSFW.
Clik here to view.

Destructive Malware – The New Trend?

The concerning trend of malware being used to create mayhem within an organization or across a large population of disparate devices seems to be here to stay. Within the security industry, one must...

View Article

DoS Attacks on Call Centers?

This is worth keeping an eye on. If the perpetrators’ focus shifts to private enterprise or provider central monitoring stations, it could create entirely new problems for our industry: From CSO...

View Article

Image may be NSFW.
Clik here to view.

Can Your Systems Withstand a 200Gbps DDoS Attack?

The numbers are amazing – and should concern anyone with critical systems that rely on IP connectivity, and those operating in data centers with this kind of “attractive” bandwidth…  (emphasis below...

View Article


Image may be NSFW.
Clik here to view.

Internet Scans Turn Up More Unsecured Hardware

Vulnerable terminal servers reflect bigger security problem April 26, 2013 — CSO — Security weaknesses uncovered in terminal servers used to provide an Internet connection to a wide variety of...

View Article

Image may be NSFW.
Clik here to view.

Another Reason to Keep Keys in Your Pocket!

We learned this week about an unbelievably bad idea in the way of an online business called “Keys Duplicated” that will copy mechanical keys from a photograph submitted via their site. Users are...

View Article

Image may be NSFW.
Clik here to view.

IZON Cameras Hacked – Just the latest home security device in a long list…

The IZON surveillance camera sold in Apple Stores and Best Buy outlets is filled with security holes that enable a hacker to easily commandeer the device, a security researcher said. In this case, the...

View Article


Image may be NSFW.
Clik here to view.

Encrypting the Web: Who is Doing What?

The Electronic Frontier Foundation (EFF) has updated their report on the support of various encryption and security methods by popular online service providers. Best to check out the original post...

View Article


Image may be NSFW.
Clik here to view.

Linux Worm Targets Embedded Devices

Dark Reading (12/06/13) Chickowski, Ericka A newly discovered Linux worm targeting embedded devices is the latest example of such attacks aimed at the Internet of Things. The Zollard worm was...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images