458 Results for:TLS

  • Sort by: 

Android P security improves authentication trust and data privacy

By Michael Heller 10 May 2018

Android P security features, which were previewed at Google I/O, include notable improvements for data privacy and encryption and preventing malicious apps from spying on users. Read More

Banking trojans roar back to prominence in May

By Alex Scroxton 15 Jun 2020

Check Point sees an upswing in malicious activity around a number of classic banking trojan malware variants Read More

SANS Institute: DNS attacks gaining steam in 2019

By Mekhala Roy 13 Mar 2019

At RSA Conference 2019, experts from the SANS Institute discuss the most dangerous attack techniques they've seen, including DNS manipulation and domain fronting. Read More

InCountry launches Data Residency-As-A-Service (DRaaS)

By Adrian Bridgwater 13 May 2019

InCountry is aiming to position its technology as a benefit for developers dealing with the headache of data compliance. The InCountry application uses its own API to store and retrieve records in ... Read More

File system software startup Quobyte chases IT, developers

By Dave Raffo 13 Oct 2020

Quobyte tempts developers and app owners with a free version of its distributed parallel file system software, hoping they will convince their IT admins to buy fully supported editions. Read More

Breaking down the DROWN attack and SSLv2 vulnerability

By Michael Cobb 21 Apr 2016

A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Read More

A damaging spring of internet worms and poor performance

By Kathleen Richards 01 Sep 2017

Security is a hot topic for media outlets that report on stock markets as companies founder on corporate earnings. The financial fallout of global malware is a call to action. Read More

How lattice-based cryptography will improve encryption

By Michael Cobb 07 Jun 2018

As the prospect of quantum computing-based attacks grows, the need for stronger encryption increases. Expert Michael Cobb discusses lattice-based cryptography as an option. Read More

How layered security can help and hinder application security

By Kevin Beaver 31 May 2018

The growth of technology includes the growth of layered security. Join expert Kevin Beaver as he explains the pros and cons of layered defenses for application security. Read More

Zscaler charts sharp increase in SSL threats like phishing, botnets

By Mekhala Roy 11 Mar 2019

Threat actors are exploiting encryption protocols to deliver malicious content, according to Zscaler, which found a 400% increase in SSL-based phishing threats last year. Read More