1. Cover Your Assets: How to Limit the Risk of Attack on your Windows XP Assets Tom D’Aquino – Sr. Security Engineer 2. ABOUT ALIENVAULT AlienVault has unified the security…
1. In 2012, the Android OS continued to be the number one target for mobile malware. Overall, the number of malware attacks more than doubled from 2011 to 2012. Additionally,…
1. 10 Signs We’re In For More Data Breaches 2. Under Constant Barrage Defending against data breaches has never been more challenging, and the stakes have never been higher.…
1.A Websense® White Paper Websense Security Labs State of Internet Security, Q1 – Q2, 2009 2. Websense Security Labs™: State of Internet Security, Q1 - Q2, 2009 Key…
1.Cross-Site Scripting (XSS) Mattash Ali2. What is a XSS Attack? XSS Attack is a potentially dangerous security vulnerability found in web-based applications It allows…
1. 8 Ways to Prevent Data Loss 2. Why worry about data loss? • As you move more data to the cloud, it becomes imperative to protect it • Whether moving from Microsoft…
Subject Cyber Threat Trends in Taiwan Henry Yu TWNCERT 2015 Taiwan National Computer Emergency Response Team ‹#› Outline Introduction of NICST Even More Aggressive E-Mail…