Authors of the malware, which signs up mobile users for premium services, are repeatedly finding ways to bypass app review checks.
Read moreWhen WAFs Go Wrong
July 9 2020Web application firewalls are increasingly disappointing enterprises today. Here's why.
Read moreFor 70% of IT security professionals, the volume of security alerts has doubled in the past five years, researchers report.
Read moreFight Phishing with Intention
July 9 2020Phishing exercises have become a staple, but it helps to be as clear as possible on exactly why you're doing them.
Read moreName That Toon: Tough Times, Tough Measures
July 9 2020Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more6 Tips for Getting the Most From Nessus
July 9 2020Books have been written on using the powerful network-discovery and vulnerability-scanning tool. These tips will help you get started.
Read moreThere are many reasons to pen test, but the financial reasons tend to get ignored.
Read moreSecure content distribution
July 9 2020Traffic Analysis of Home Security Cameras
July 9 2020Interesting research on home security cameras with cloud storage. Basically, attackers can learn very basic information about what's going on in front of the camera, and infer when there...
Read moreData is fueling account takeover attacks in a big way, Digital Shadows says.
Read more
Recent Comments