The Latest in IT Security

Posts Tagged ‘security research’

A visual sample of Distributed Denial of Service (DDoS or DoS) attack tools & services compiled by Curt Wilson – Research Analyst, Arbor Networks ASERT There are a variety of popular Denial of Service attack tools that have received a fair amount of attention by the security research community, but there are many other attack […]

Read more ...

The Australian government has thumbed its nose at legal safeguards for ethical hackers, according to a report from SC Magazine. University of New South Wales security researcher Alana Maurushat on Thursday told the magazine’s “Security on the Move” conference that she and other industry professionals had gone out of their way to submit proposals for […]

Read more ...

Bug bounty programs are designed to reward security researchers for finding flaws in a vendor’s product that have made it past their own quality processes. Some organizations, such as Google and Mozilla, have had bug bounty programs in place for a time, while social networking site Facebook just announced a bug bounty program with a […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments