The Latest in IT Security

1

Problem: How do you store a password but make it nearly impossible to recover the plaintext in the event that the database with the password hash is compromised? When doing software development, it’s critical to review these functions. Having good development standards for your team will ensure that people store passwords properly and avoid mistakes […]

Read more ...

1

A newly discovered hooking technique can go completely undetected by the current implementation of PatchGuard, CyberArk security researchers warn. Called BoundHook, the method relies on causing an exception in a very specific location in a user-mode context, as well as on catching that exception to gain control over the thread execution. It can bypass PatchGuard, […]

Read more ...

1

More than 4 million mobile apps are currently in production, but only 29% on average are tested for bugs, and nearly a third of these contain significant vulnerabilities, according to a recent Ponemon Institute survey. Enterprises, meanwhile, are expected to accelerate their mobile app development in the coming months, according to a recent Gartner survey. […]

Read more ...

1

Many people in the security industry today grew up watching “Star Trek,” from the original episodes to Next Generation, Deep Space Nine, Voyager, Enterprise and the many other series that followed. In anticipation of the upcoming “Star Trek: Discovery” series, we thought it would be a good time to remind our readers that, beyond the […]

Read more ...

Categories

SUNDAY, NOVEMBER 19, 2017

Featured

Archives

Latest Comments

Social Networks