Clickjacking, a term coined by Jeremiah Grossman in 2008, is quickly becoming an extremely dangerous threat. Recent news coverage of enormous clickjacking schemes are...
Hi, what are you looking for?
Clickjacking, a term coined by Jeremiah Grossman in 2008, is quickly becoming an extremely dangerous threat. Recent news coverage of enormous clickjacking schemes are...
Today more than ever, organizations are examining existing security programs. Those that don’t have a formal security plan in place are thinking about, if...
There are some things that the best CIOs and IT managers can’t prevent entirely as they depend on other people. An example of this...
“There’s an app for that” has become a mantra of the modern day smartphone carrier. Most businesses are deploying mobile apps as a convenient...
The Days of Social Engineering Attacks Being Reserved for Governments and Organizations With Enemies Are Long Gone.
What Can we Learn From Some of the Significant Hacks in 2011?As we round the corner to the last quarter of 2011 and move...
Real Security goes Beyond Compliance, and Integrates with Validation and Security Processes.