As you might expect, the primary function of RASP is to protect web applications against known and emerging threats; it is typically deployed to block attacks at the application layer, before vulnerabilities can be exploited. There is no question that the industry needs application security platforms – major new vulnerabilities are disclosed just about every […]
According to a recent cybersecurity survey conducted by HighSpeedInternet.com, 25 percent of people said either they or someone they know has been hacked. Worse yet, research from the Ponemon Institute suggests that nearly 50 percent of adults in America had their personal information exposed by hackers in 2014. Read about the 14 cyber security terms […]
In May 2016, the Special Investigations team at Forcepoint revealed the existence of a botnet campaign that is unique in targeting a very small number of individuals while in tandem, herding thousands of victims into general groups. Read Andy Settle from Forcepoint explain what is Jaku botnet and how it works on Help Net Security.
Read Alexander Sword explain what exactly is hacking on Computer Business Review : The term ‘hacking’ is used very broadly, but in general is used to refer to seeking and exploiting weaknesses to networks and databases.Hacking may target a network, which allows the hacker to gain access to a network and then intercept traffic on […]
Though phishing has been around for years, it continues to affect many users who still fall prey to tactics used to bait victims into disclosing personal identities and login credentials. Read the definitive article about phishing on Infosec Institute.
The latest reports suggest the highly publicised ‘Panama Papers’ data leak was the result of a hacking technique known as SQL injection. With 11.5 million files being leaked, the Mossack Fonseca breach exceeds even the 1.7 million files leaked by the infamous Edward Snowden. Read what is a SQL Injection and how you can safeguard […]
Read Riley Walters explain Internet of Things on Heritage : The term “Internet of Things” (IoT) refers to all electronic devices that are connected and communicate information across a network or networks. Consumers may have experience with IoT technology from the use of wearable devices such as smart watches or fitness trackers. For manufacturers, it is […]
Read Ericka Chickowski’s article about a brief history of ransomware on Dark Reading : The rise in ransomware extortion as a reliable weapon for cybercriminals to make the most of victims’ system vulnerabilities has now spanned the better part of a decade. But the last year has seen hockey stick growth as attackers perfected their […]
Read why Adrian Bridgwater says that bots can also be good on Forbes : Like hacking, bots used to be a largely negative technology term. As hacking evolved into positively charged developer hackathons and web ‘mashup’ hacks, the term shook off much of its malevolent image. Bots have also grown up. Too long they have […]
Read Jon Morello write about container security for enterprise computing on Help Net Security : The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not have the level of visibility and control that they are accustomed to. Read his full […]