Securing your mobile application traffic is apparently more difficult than it should be, as researchers Anthony Trummer and Tushar Dalvi discovered when looking into SSL/TLS usage on the Android operating system and applications, as well as on iOS and Windows 8 mobile.
For many people involved in the infosecurity community, the notion of security is too often tied to the quality of code (resistance to specific classes of bug, for example) and effective patching - in short, to low-level security.
Honeypots - decoy systems used for learning cyber attackers' capabilities and potential objectives - can be very useful to organizations, businesses, and individuals.
John Matherly's Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts (e.g.
In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.