The Latest in IT Security

Posts Tagged ‘research purposes’

A pair of security researchers have created their own version of the notorious Firesheep plugin to expose a data leak in the world’s favourite search engine. The proof-of-concept plugin exploits the use of unencrypted cookies by Google’s Web History feature. Although you need to be logged in to make use of Web History it does […]

Read more ...

I was recently asked a few questions about malwareblacklist.com, a project I created a while back. 1. What is the idea behind MalwareBlacklist.com? The goal is to create a quality resource for security researchers and companies looking for up-to-date malicious sites. 2. Who typically are users of MalwareBlacklist.com? Our users range from traditional malware researchers, […]

Read more ...


Categories

TUESDAY, APRIL 30, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments