Is Ukraine the perfect place for hackers?

Is Ukraine the perfect place for hackers?


Is Ukraine the perfect place for hackers?

Posted: 14 Mar 2012 08:41 AM PDT

What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate legislation, a police fo...

Key management device for payment security

Posted: 14 Mar 2012 07:11 AM PDT

Thales announced its Key Management Device (KMD) for payment hardware security modules (HSMs) to provide high assurance security for the critical task of forming cryptographic keys securely from compo...

Malware sophistication worries IT leaders

Posted: 14 Mar 2012 06:57 AM PDT

More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent cited the growing number of...

The evolution of malware and the threat landscape

Posted: 14 Mar 2012 06:40 AM PDT

The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT organizations around the world. Vu...

Microsoft adds new protection mechanisms to IE 10

Posted: 14 Mar 2012 05:59 AM PDT

At the CanSecWest conference held last week in Vancouver, a team of vulnerability researchers from French security firm VUPEN has managed to hack Microsoft's Internet Explorer 9 on a fully patched Win...

BYOD security for cloud Wi-Fi access

Posted: 14 Mar 2012 05:45 AM PDT

AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, classification and policy enforc...

Fake online streaming service phishes and robs users

Posted: 14 Mar 2012 04:30 AM PDT

With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, cyber crooks have also b...

China escalating Tibetan cold war into cyberspace

Posted: 14 Mar 2012 03:53 AM PDT

AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a serious escalation into cybe...

Machine Learning for Hackers

Posted: 14 Mar 2012 03:01 AM PDT

If you're an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that enables computers to train themse...

0 comments:

Post a Comment