article thumbnail

Links for June 8 2014

Eric D. Brown

With mobile technology expanding outward from phones and tablets to the Internet of Things, wearables, and automotive, we can only expect things to move even faster, driving even more innovation and new and exciting products that enrich our lives. In Big Companies, The Public Cloud Is Leaving The Private Cloud In The Dust.

article thumbnail

Ingenious Phishing Tactics in the Modern Scammer's Toolbox

SecureWorld News

When it comes to impactful types of internet-borne crime, phishing is the name of the game. Also referred to as the "evil twin," the phony wireless network provides a would-be victim with an internet connection, possibly with a stronger signal than the original, with no heads-up visible to the naked eye. And for good reason.

Google 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Network filters applied by solutions like Web Application Firewalls (WAFs) aim to solve symptoms, not the root cause. One common approach to addressing software security issues is applying network filters. This is an easy band-aid. However, we don’t think it is the right long-term solution. How do we know which software to fix?

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Network filters applied by solutions like Web Application Firewalls (WAFs) aim to solve symptoms, not the root cause. One common approach to addressing software security issues is applying network filters. This is an easy band-aid. However, we don’t think it is the right long-term solution. How do we know which software to fix?

article thumbnail

A REFLECTION ON FORALLSECURE'S JOURNEY IN BOOTSTRAPPING BEHAVIOR TESTING TECHNOLOGY

ForAllSecure

Network filters applied by solutions like Web Application Firewalls (WAFs) aim to solve symptoms, not the root cause. One common approach to addressing software security issues is applying network filters. This is an easy band-aid. However, we don’t think it is the right long-term solution. How do we know which software to fix?

article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

That’s perhaps because of a dedicated group of hackers who are working to improve automotive security. Fortunately, there's a group of automotive hackers that are trying to help. And he's been working with the automotive industry for years as a consultant and a hacker. We haven’t seen many attacks on our smart cars.