Searched for: "how hackers exploit application weaknesses"
- Security (18)
- Windows (9)
- Networking (7)
- Servers (5)
- Software (3)
- Software Development (3)
- Banking (2)
- Outage (2)
- Web Development (2)
- Wi-Fi (2)
- Broadband (1)
- Collaboration (1)
- Data Management (1)
- Enterprise Software (1)
- Government (1)
- Hardware (1)
- Linux (1)
- Malware (1)
- Microsoft (1)
- Open Source (1)
- Printers (1)
- Smartphones (1)
About 70 results for "how hackers exploit application weaknesses"
Two security analysts look at what Apple Pay has to offer for securing mobile credit payments.
Jack Wallen offers his reaction to the tragic Heartbleed bug and suggests the solution is more challenging than one might assume.
Microsoft's redemption song in Africa: Catalyzing tech revolutions on the world's least connected continent
Africans are taking control of their own destiny in technology, and Microsoft is no longer just giving away software but using its resources to fuel innovation fires instead.
Regarding DDoS attacks, one security researcher says, "There is no security, there is only time." Is this perspective the key to better defense and mitigation?
People who use online password managers have a lot riding on the application's integrity. What are the chances of others gaining access to the stored passwords?
Alfonso Barreiro lists the most important security lessons from 2011 that the security-conscious should heed in order to plan accordingly for 2012.
Apple kicks out an iOS developer for showcasing a bypass of the code signing mechanism. Is this helping or hurting their cause?
A group of Berkeley researchers take a long, hard look at mobile malware. What they found should interest you.
Beware. Bad guys have their sights on Android and iOS. Experts compare the two security approaches and point out weaknesses for each platform.
Network perimeters are under attack. That's not news, but the techniques now being used are. Michael Kassner reports on AETs -- Advanced Evasion Techniques.