I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack by hackers.
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the developer of a fourth one hope to compete? The Nuclear exploit pack has been present for a while now, and its author has recently released version 2.0.
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent security events.
When earlier this year Google introduced Bouncer - an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and simulating how they will run on an Android device - it shared practically nothing about how it operates, in the hopes of making malicious app developers' scramble for a while to discover how to bypass it.
To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and take action against rogue mobile apps that attempt to serve up malware or phishing attacks.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.