Monday, October 2, 2017

How does the Antbleed backdoor vulnerability work?

TechTarget
Latest Technology News & Expert Advice     October 02, 2017
TechTarget
Issue Highlights:
How does the Antbleed backdoor vulnerability work?
Advanced Persistent Security
Ransomware attackers using more sophisticated techniques
Definition: cyberwarfare
Securing SQL Server: Protecting Your Database from Attackers
How does the Antbleed backdoor vulnerability work?
Antbleed, a backdoor vulnerability, was discovered in bitcoin mining equipment. Expert Matthew Pascucci explains how the Bitmain flaw works and how it can be prevented.
Advanced Persistent Security
In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations.
Ransomware attackers using more sophisticated techniques
At the (ISC)2 Security Congress, infosec professionals warned of sophisticated ransomware attackers that are using more advanced techniques to encrypt entire networks.
Definition: cyberwarfare
Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state.
Securing SQL Server: Protecting Your Database from Attackers
In this excerpt from chapter nine of Securing SQL Server, author Denny Cherry discusses why SQL injection attacks are so successful.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: