Browsing the "Mobile Security" Tag

Inside the Hoaxcalls Botnet: Both Success and Failure – Threatpost

May 28th, 2020 📆 | 4184 Views ⚑

Inside the Hoaxcalls Botnet: Both Success and Failure Threatpost Source link

Tagged with:




PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time – Threatpost

May 28th, 2020 📆 | 5621 Views ⚑

PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time Threatpost Source link

Tagged with:




‘[F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App – Threatpost

May 28th, 2020 📆 | 3833 Views ⚑

‘F]Unicorn’ Ransomware Impersonates Legit COVID-19 Contact-Tracing App Threatpost Source link

Tagged with:




Google Android RCE Bug Allows Attacker Full Device Access – Threatpost

May 24th, 2020 📆 | 2264 Views ⚑

Google Android RCE Bug Allows Attacker Full Device Access Threatpost Source link

Tagged with:




Sphinx Malware Returns to Riddle U.S. Targets, with Modifications – Threatpost

May 22nd, 2020 📆 | 6263 Views ⚑

Sphinx Malware Returns to Riddle U.S. Targets, with Modifications Threatpost Source link

Tagged with:




Critical Cisco Bug in Unified CCX Allows Remote Code Execution – Threatpost

May 22nd, 2020 📆 | 5312 Views ⚑

Critical Cisco Bug in Unified CCX Allows Remote Code Execution Threatpost Source link

Tagged with:




Silent Night Banking Trojan Charges Top Dollar on the Underground – Threatpost

May 21st, 2020 📆 | 4606 Views ⚑

Silent Night Banking Trojan Charges Top Dollar on the Underground Threatpost Source link

Tagged with:




Hoaxcalls Botnet Exploits Symantec Secure Web Gateways – Threatpost

May 16th, 2020 📆 | 3374 Views ⚑

Hoaxcalls Botnet Exploits Symantec Secure Web Gateways Threatpost Source link

Tagged with:




Webinar: How Leaders Can Build Resilience During Crises

April 22nd, 2020 📆 | 4097 Views ⚑

As Covid-19 continues to have a profound effect on our businesses, effective leadership is critical if you are going to

Tagged with:




The 5 Most Dangerous New Attack Techniques and How to Counter Them

February 28th, 2020 📆 | 1868 Views ⚑

Moderator: Alan Paller, Research Director and Founder, SANS Institute Panelists: Heather Mahalik, Senior Instructor and Director of Digital Intelligence, SANS

Tagged with:




Deep Dive Analysis of Current Enterprise Network Security Mechanisms

February 26th, 2020 📆 | 6676 Views ⚑

Dr. Avril Salter, Technologist, Salter & Association This session will provide a unique perspective on how to compare and contrast

Tagged with:







Researcher Discloses Second Steam Zero-Day After Valve Bug Bounty Ban – Threatpost

August 22nd, 2019 📆 | 8263 Views ⚑

Researcher Discloses Second Steam Zero-Day After Valve Bug Bounty Ban Threatpost After Valve banned him from its bug bounty program,

Tagged with:







it-sa 2019 – What’s your most pressing question on IT security?

June 27th, 2019 📆 | 6441 Views ⚑

For ten years now, IT security experts from around the world have been gathering annually at it-sa in Exhibition Centre

Tagged with:




Demystifying the Cloud: Applying Old Tricks to New Problems

June 26th, 2019 📆 | 8102 Views ⚑

Understand the basics of security in AWS and get a sneak peak of our newest tooling to visualize attack paths

Tagged with: