Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 81 to 90
FLARE Script Series: Reverse Engineering WebAssembly Modules Using The Idawasm IDA Pro Plugin
5th Oct 2018 [one month ago] from FireEye Research
IntroductionThis post continues the FireEye Labs Advanced Reverse Engineering(FLARE) script series. Here, we introduce idawasm, an IDA Pro pluginthat provides a loader and processor modules for WebAssembly modules.idawasm works on all operating...
Virus Bulletin 2018: Supply Chain Hacking Grows Up
5th Oct 2018 [one month ago] from ESET Research
Striking the balance between supply, demand and safety is a major concern The post Virus Bulletin 2018: Supply chain hacking grows up appeared first on WeLiveSecurity
Make It A Cyber-habit: Five Simple Steps To Staying Safe Online
5th Oct 2018 [one month ago] from ESET Research
What are some essential steps you can take to increase your online safety – now and in the long run? The post Make it a cyber-habit: Five simple steps to staying safe online appeared first on WeLiveSecurity
Microsoft Partners With DigiCert To Begin Deprecating Symantec TLS Certificates
4th Oct 2018 [one month ago] from Microsoft
Starting in September 2018, Microsoft began deprecating the SSL/TLS capability of Symantec root certificates due to compliance issues. The post Microsoft partners with DigiCert to begin deprecating Symantec TLS certificates appeared first...
Why Ask The Public About Cybercrime And Cybersecurity?
4th Oct 2018 [one month ago] from ESET Research
Answers could help raise awareness of situations that people fear The post Why ask the public about cybercrime and cybersecurity? appeared first on WeLiveSecurity
Virus Bulletin 2018: Attack Velocity Ramps Up
4th Oct 2018 [one month ago] from ESET Research
Some tips for helping to keep your data more secure from the floor of VB 2018 The post Virus Bulletin 2018: Attack velocity ramps up appeared first on WeLiveSecurity
Why You Shouldnt Trust Safe Spying Apps!
3rd Oct 2018 [one month ago] from Zscaler
During a recent malware hunt, the ZscalerTM ThreatLabZ research team came across a suspicious Android app on Google Play, the official Google app store, named SPYMIE. SPYMIE portrays itself as an Android-based key logger designed for...
Facebook: No Evidence Attackers Used Stolen Access Tokens On Third-party Sites
3rd Oct 2018 [one month ago] from ESET Research
The social networking behemoth is expected to face a formal investigation by Ireland’s Data Protection Commission in what could be the “acid test” of GDPR since the law became effective in May The post Facebook: No evidence attackers...
APT38: Details On New North Korean Regime-Backed Threat Group
3rd Oct 2018 [one month ago] from FireEye Research
Today, we are releasing details on the threat group that we believeis responsible for conducting financial crime on behalf of the NorthKorean regime, stealing millions of dollars from banks worldwide. Thegroup is particularly aggressive;...
IT Forensic Tools: How To Find The Right One For Each Incident
3rd Oct 2018 [one month ago] from ESET Research
Some online resources that will help you find the most suitable IT forensic tools for each case The post IT forensic tools: How to find the right one for each incident appeared first on WeLiveSecurity
« Newer 4 5 6 7 8 9 10 11 12 13 Older »