The Latest in IT Security

Posts Tagged ‘intrusions’

Blackhat USA 2011 wraps up and the Defcon conference starts today. There is a little something for everyone in security here. Aside from the contests, networking, meeting folks in the industry and putting faces to names, I thought that the briefings had two fantastic talks. The first of the two focused on breaking out of […]

Read more ...

Hello everyone, I have the privilege of being the only Naked Security writer attending this years Black Hat conference in sunny Las vegas. This also means I have the honor of trying to provide you with the most interesting developments presented at the event. This morning I attended an interesting presentation titled "Macs in the […]

Read more ...

Download the PDF version of Operation Shady RAT report For the last few years, especially since the public revelation of Operation Aurora, the targeted successful intrusion into Google and two dozen other companies, I have often been asked by our worldwide customers if they should worry about such sophisticated penetrations themselves or if that is […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments