Day 1 : http://techblog.avira.com/2009/09/24/vb-conference-day-1/en/
Day 2 : http://techblog.avira.com/2009/09/25/vb-conference-day-2/en/
Day 3 : http://techblog.avira.com/2009/09/28/vb-conference-day-3/en/
Cybersecurity, Automotive Security, Antimalware Software, Product Management, Agile, AI, Secure Software Development, SSDLC
Day 1 : http://techblog.avira.com/2009/09/24/vb-conference-day-1/en/
Day 2 : http://techblog.avira.com/2009/09/25/vb-conference-day-2/en/
Day 3 : http://techblog.avira.com/2009/09/28/vb-conference-day-3/en/
Ever wondered what a “spear phishing” is ? Or a “targeted malware” ? See below: It is an email targeted to a member of an organization, which is made to look as legitimate as possible. The difference between normal phishing and malware emails and a targeted one is that the contents of the emails […]
What is it? Malvertising : Malware delivered through Advertising. These corrupted ads are designed to appear legitimate but they may serve malicious code, which can infect a user’s device simply through viewing or clicking on the ad. Malvertising exploits the expansive reach and complex supply chains of online advertising networks, enabling attackers to deliver […]
http://www.usatoday.com/tech/products/software/2010-08-09-apple09_ST_N.htm?loc=interstitialskip Somewhere in the middle of the article: Apple’s problem is singular. The company has made a big deal about hiding technical details of iOS, allowing only approved Web apps to tie in. This tight control initially made it easier to keep iOS secure. But now Apple may have to share iOS coding with anti-virus […]
You must be logged in to post a comment.