Jump to content

Search the Community

Showing results for tags 'threats'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 2 results

  1. Security intelligence and analytics solutions provider Endgame, Inc. on Tuesday announced the launch of its enterprise endpoint detection and response platform, Endgame Enterprise. Endgame, which historically has focused on providing solutions to the U.S. government, including tools and zero-day exploits used for offensive purposes, said in 2014 that it would shift its focus to sell its platform to enterprise customers. According to the Arlington, Virginia-based company, its enterprise solution, which focuses on protecting critical infrastructure, “thinks like the adversary” and helps customers to detect and respond to unknown cyber threats. Endgame LogoUsing threat detection algorithms and attack-chain analysis designed to discover zero-day and advanced threats without the use of signatures, the company says that its new host-based software solution is able to detect suspicious behavior and help enterprise security teams accelerate investigation, containment and remediation. “Endgame Enterprise captures and analyzes the details of an attack, giving incident responders rich attack-path intelligence and insight into the consequences of cyber threats,” the company explained. “Our research on advanced threats, vulnerabilities and attack patterns, and our history protecting some of the nation’s most sensitive national security assets, allows us to understand defenses from the adversary’s perspective,” said Endgame CEO Nate Fick. “Endgame Enterprise empowers existing security teams to accelerate the investigation and remediation of threats that would otherwise go undetected.” Founded in 2008, Endgame currently has over 100 employees and has offices in Washington, DC, San Francisco, CA, San Antonio, TX and Melbourne, FL. In Nov. 2014, the company announced that it had raised $30 million in a Series C equity funding round, bringing the total amount raised by the firm to $90 million. Sursa: securityweek.com
  2. Table of Contents I. Introduction: .......................................................................................................................... 1 II. Threats posed to business professionals by open Wi-Fi hotspots...................................... 2 A. Most common threats to devices connected to open Wi-Fi hotspots....................................3 1. Types and description of threats................................................................................... 3 2. Basic security measures:................................................................................................ 3 B. Evil Twin............................................................................................................................................4 1. What is an evil twin?...................................................................................................... 4 2.Effects of evil-twin attack on the end user...............................................................................6 III. The repercussions of lack of a sound security for the Wi-Fi.......................................... 6 A.The after-effects of being a victim of cyber-crime....................................................................6 1. Loss of money to restore the system to its original state: ........................................... 6 2. Loss of time in retrieving back the lost/damaged/misused data:............................... 6 IV. Measures to mitigate evil twin attacks............................................................................. 7 A.WPA-PSK method:..........................................................................................................................7 B. Using a Virtual Private Network: ................................................................................................7 C. Awareness of cyber security ........................................................................................................12 D.Introducing the concept of basics of cyber-security to students at an earlier age. .........14 V. The perks of upgrading to stronger security measures as mentioned above:.................. 15 A.Increases the productivity of an organization and reduces the avoidable expenses. .....15 B. Beneficial to end-users as their private data is kept private and unaffected. ..................15 C.Works towards building a better and a robust security system throughout. ..................15 VI. Conclusion:............................................................................................................................ 15 VII. References:........................................................................................................................... 17 Source
×
×
  • Create New...