May 29, 2015 Wipe Leaves Crumbs, Android App Tampering, SMS iPhone Crash – Mobile Security Weekly Both iOS and Android had several problematic issues this week, making it clear (once again!) ...
May 27, 2015 CapTipper – Malicious HTTP Traffic Explorer The Problem In recent years, the Internet has experienced a large number of “drive-by” ...
Research May 22, 2015 Stopping the Next Massive Cyberattack – Step 2: Segmentation When it comes to cybersecurity, conducting a thorough assessment of your current environment to identify ...
May 22, 2015 Safari Bugs Buzzing, South Korea Spie on Teens, Apple Watch Time Out – Mobile Security Weekly The world of mobile security has been going in many different directions over the last ...
May 20, 2015 Check Point Threat Alert: Logjam Executive Summary A major flaw was discovered with SSL and was named “Logjam”. The flaw ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
May 14, 2015 Analysis of the Havij SQL Injection tool Havij, an automatic SQL Injection tool, is distributed by ITSecTeam, an Iranian security company. The ...
Research May 12, 2015 The 1st Step to Stopping the Next Massive Cyberattack: Assess Given the ever-increasing sophistication of cybercrime methods, organizations must employ advanced assessment tools and practices ...
May 12, 2015 The Microsoft Help File (.chm) May Enslave You “Microsoft Compiled HTML Help” is a Microsoft proprietary online help format that consists of a ...
May 9, 2015 Android Under Attack! – Mobile Security Weekly While perhaps not emulating last week’s massive haul of mobile security hazards, this week’s stories ...