Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security.
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to use, claimed and proved Trustwave researchers at the recently held Hack In The Box conference in Kuala Lumpur.
Think about all the passwords we use to access information every day.
Social engineering has for a while now been cyber attackers' best bet to enter systems and compromise accounts when actual hacking doesn't work, or when they simply don't want to waste much time getting in.
What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? Vanja Svajcer, principal virus researcher at SophosLabs, talks about their efforts to create a mobile PUA taxonomy that would be accurate and helpful to all the stakeholders in the mobile environment, and especially the end users.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.