Is Ukraine the perfect place for hackers? |
- Is Ukraine the perfect place for hackers?
- Key management device for payment security
- Malware sophistication worries IT leaders
- The evolution of malware and the threat landscape
- Microsoft adds new protection mechanisms to IE 10
- BYOD security for cloud Wi-Fi access
- Fake online streaming service phishes and robs users
- China escalating Tibetan cold war into cyberspace
- Machine Learning for Hackers
Is Ukraine the perfect place for hackers? Posted: 14 Mar 2012 08:41 AM PDT What is it that makes the Ukraine such a fitting refuge for hackers and cyber crooks? According to a number of well-informed individuals, it is a combination of inadequate legislation, a police fo... |
Key management device for payment security Posted: 14 Mar 2012 07:11 AM PDT Thales announced its Key Management Device (KMD) for payment hardware security modules (HSMs) to provide high assurance security for the critical task of forming cryptographic keys securely from compo... |
Malware sophistication worries IT leaders Posted: 14 Mar 2012 06:57 AM PDT More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent cited the growing number of... |
The evolution of malware and the threat landscape Posted: 14 Mar 2012 06:40 AM PDT The past 10 years represent a very interesting timeframe for reviewing vulnerability disclosures and ensuing changes that continue to affect risk management in IT organizations around the world. Vu... |
Microsoft adds new protection mechanisms to IE 10 Posted: 14 Mar 2012 05:59 AM PDT At the CanSecWest conference held last week in Vancouver, a team of vulnerability researchers from French security firm VUPEN has managed to hack Microsoft's Internet Explorer 9 on a fully patched Win... |
BYOD security for cloud Wi-Fi access Posted: 14 Mar 2012 05:45 AM PDT AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, classification and policy enforc... |
Fake online streaming service phishes and robs users Posted: 14 Mar 2012 04:30 AM PDT With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, cyber crooks have also b... |
China escalating Tibetan cold war into cyberspace Posted: 14 Mar 2012 03:53 AM PDT AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a serious escalation into cybe... |
Posted: 14 Mar 2012 03:01 AM PDT If you're an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learninga toolkit of algorithms that enables computers to train themse... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment