Tuesday, February 14, 2017

How does the Android Trojan Triada infect a device's core processes?

TechTarget
Latest Technology News and Expert Advice
A roundup of news and tips on the topics you're interested in | February 14, 2017
TechTarget
ISSUE HIGHLIGHTS
How does the Android Trojan Triada infect a device's core processes?
Are security people born with unique talents? We ask Kevin Johnson
When to take a bug bounty program public -- and how to do it
Definition: spyware
Ransomware threat continues to evolve, defense needs to catch up
NEWS
Ransomware threat continues to evolve, defense needs to catch up
With the rapid expansion of the ransomware threat landscape, defenders are scrambling to find ways to fight back and RSAC 2017 dedicated a full day for a ransomware seminar.  
EXPERT ADVICE
How does the Android Trojan Triada infect a device's core processes?
The Android Trojan Triada has the ability to replace a device's system functions with its own. Expert Michael Cobb explains how to mitigate the effects of this serious threat.  
Are security people born with unique talents? We ask Kevin Johnson
The founder and CEO of Secure Ideas tells Marcus Ranum about his inner journey, from systems administrator at a friend's startup to ethical hacker for hire.  
When to take a bug bounty program public -- and how to do it
Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public.  
Definition: spyware
Spyware is software that is installed on a computing device without the user's knowledge or permission.  
About This E-Newsletter
This email is published by the TechTarget Security Media Group. Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
TechTarget
To unsubscribe from all Security Media Group emails,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this email, your information may be shared with the sponsors of that content as described in our Privacy Policy.

About TechTarget:
TechTarget publishes media for IT pros with more than 100 focused websites providing quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job.

No comments: