Related news
  • Deceive in order to detect

    Published: 19/01/2017
    In addition to the basic methods and technologies developed to protect corporate networks, there are interactive methods of protection that not only detect an intruder in the infrastructure but also, ... Read more
    Source: securelist.com
  • Shadow IT and "No" versus "Know"

    Published: 18/01/2017
    In an information-based economy where bring-your-own devices (BYOD) and, increasingly, bring-your-own applications (BYOA), are the norm, IT groups are struggling to enable their organizations to be fa ... Read more
    Source: blog.avast.com
  • Do web injections exist for Android?

    Published: 18/01/2017
    Man-in-the-Browser (MITB) attacks can be implemented using various means, including malicious DLLs, rogue extensions, or more complicated malicious code injected into pages in the browser. We're often ... Read more
    Source: securelist.com