Quantcast
Channel: Simply Security » Research
Browsing latest articles
Browse All 10 View Live

Research uncovers database security disconnect

  As a greater portion of business operations and communications are migrated to online platforms, it is becoming clear that the burden of information security is too great for IT personnel alone....

View Article



Companies should do more to secure information at data level

As companies are growing more adept at producing and storing large amounts of data, their habits for securing and protecting the information haven't quite caught up, according to a new report from risk...

View Article

Researchers track consequences of lost mobile devices

Business professionals have heard time and again that a lost or stolen smartphone or tablet can become a serious liability. Researchers from Symantec have put these advisories into context after a...

View Article

Security researcher demonstrates NFC’s potential as hacking tool

Earlier this week at the Black Hat USA 2012 conference, former National Security Agency employee and current Accuvant principal research consultant Charlie Miller demonstrated what could very well be...

View Article

Report: Evasive malware outflanking signature-based defenses

With clever cybercriminals continuously refining trusted tactics and developing new attack strategies, IT professionals have come to understand that network security will always be a moving target. Yet...

View Article


NIST selects next encryption standard

Following concerns that the third iteration of the secure hash algorithm (SHA-2) may be vulnerable to attack, the National Institute of Standards and Technology (NIST) issued an open call in 2007 to...

View Article

MegaDroid projects testing mobile security at scale

The Sandia National Laboratories, originally founded to develop and test non-nuclear components of nuclear weapons for the Department of Energy during the Cold War, have been a fixture within the...

View Article

Research outlines mobile app privacy disconnect

As mobile applications evolve from occasional accessories into ubiquitous utilities, security researchers are hoping to get a grip on privacy implications before it's too late. Analysts from Juniper...

View Article


DDoS, SQL injection top cybercriminal priority lists

Knowing your adversary's next move is an invaluable advantage when it comes to securing corporate networks. And although hackers are a notoriously unpredictable lot, researchers from Imperva recently...

View Article


Hackers could pervert power of the cloud for new attacks

The seemingly limitless computational power of cloud computing is among the technology's most attractive value propositions, but placed in the wrong hands, it could fuel untold danger. According to a...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images