Search results: security analysis

Security Analysis of Apple’s “Find My…” Protocol

Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“: Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking ...

DEF CON 28 Safe Mode Red Team Village – Ankur Chowdhary’s ‘Autonomous Security Analysis & Pentesting’

Many thanks to DEF CON and Conference Speakers for publishing their comprehensive and outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON ...
Security BSides Athens 2020

Security BSides Athens 2020 – Talk 09 – Leonardo Di Donato’s ‘Falco: Runtime Security Analysis Through syscalls’

Many thanks to Security BSides Athens for publishing their tremendous Security BSides Athens 2020 Conference Videos. Enjoy! Permalink ...
AppSec California 2020

AppSecCali 2020 – Sahar Mazloom’s ‘Car Hacking: Security Analysis Of An In-Vehicle-Infotainment System And App Platform’

Many thanks to AppSec California 2020 for publishing their outstanding AppSecCali 2020 Conference Videos. Enjoy! Permalink ...

Security Analysis of the Democracy Live Online Voting System

New research: "Security Analysis of the Democracy Live Online Voting System": Abstract: Democracy Live's OmniBallot platform is a web-based system for blank ballot delivery, ballot marking, and (optionally) online voting. Three states ...
credential theft

FireEye Focuses on Email Security Analysis with Free Offering

FireEye has begun offering a free service through which IT organizations can evaluate their email security, as those systems have become the primary mechanism through which malware gets introduced into the enterprise ...
Security Boulevard

Starting with Data-centric Security: a Cost-Benefit Analysis

| | data protection
If you take a close look at the different reference architectures and best practices documents surrounding the Zero Trust methodology, you’ll find that the big question they all try to answer is ...
What’s new in the 2021 ‘Open Source Security and Risk Analysis’ report

What’s new in the 2021 ‘Open Source Security and Risk Analysis’ report

As the use of open source has grown, so has the number of vulnerabilities. Uncover the latest findings from the 2021 OSSRA report. The post What’s new in the 2021 ‘Open Source ...

Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Managing a relatively small, stable data store is one thing, but dynamic companies face immense challenges when those circumstances change. Data growth can become unwieldy to safeguard when it has to be ...