How the German "Federal Trojan" was actually used

How the German "Federal Trojan" was actually used


How the German "Federal Trojan" was actually used

Posted: 14 Oct 2011 06:22 AM PDT

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called "Federal Trojan" and found it capable of more than just monitoring VoIP conversations,...

When it comes to intrustions, size matters

Posted: 14 Oct 2011 03:52 AM PDT

A survey of enterprise IT managers and network administrators that has been conducted annually since 2005 shows that there has been a gradual increase in smaller enterprises experiencing intrusions of...

Active response to database threats

Posted: 14 Oct 2011 02:43 AM PDT

AppSecInc announced DbProtect Active Response. Designed to provide an added layer of security around valuable and sensitive data, it gives organizations the flexibility to react accordingly to suspici...

Improve payment security in-line with PCI DSS

Posted: 14 Oct 2011 02:36 AM PDT

NNT launched version 5 of its Change Tracker and Log Tracker Enterprise software suite. The software is specifically designed to improve payment security and protect against network threats and data b...

Risk I/O partners with Qualys SaaS platform

Posted: 14 Oct 2011 02:28 AM PDT

Risk I/O announced its partnership with Qualys. Under the partnership, the companies will integrate Risk I/O with QualysGuard, enabling users to easily detect and manage vulnerabilities, while aggrega...

Digital Triage Forensics

Posted: 14 Oct 2011 02:19 AM PDT

Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The U.S. ...

0 comments:

Post a Comment