SearchSecurity

New & Notable

News

Facebook's Android app gathered call log data for years

New emails revealed that Facebook app permissions were carefully implemented to avoid alerting users to the fact that the Android app was gathering call log and SMS data.

News

First big Kubernetes security vulnerability discovered

News roundup: A critical Kubernetes vulnerability was found in the system's API server and could have a wide reach. Plus, ESET found 21 new Linux malware families, and more.

News

Risk & Repeat: RSA Conference 2019 eyes diversity improvements

This week's Risk & Repeat podcast looks at RSA Conference's diversity and inclusion initiatives and discusses what they mean for both the event and the infosec industry.

Manage

How hackers can bypass WhatsApp web app encryption

WhatsApp vulnerabilities can enable hackers to bypass end-to-end encryption and spoof messages. Expert Michael Cobb explains how these attacks work and how to prevent them.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it...

  • Get Started

    remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • Get Started

    IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate another computer system, or to hide the identity of the sender, or both.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Alternative operating system security

    Facebook's Android app gathered call log data for years

    New emails revealed that Facebook app permissions were carefully implemented to avoid alerting users to the fact that the Android app was gathering call log and SMS data.

  • Email and messaging threats

    NRCC forced to admit email breach from April

    A security company was brought in to investigate a National Republican Congressional Committee breach from April, but little is known about the NRCC email theft.

  • Malware, virus, Trojan and spyware protection and removal

    Pegasus spyware linked to two journalist deaths

    Soon after the Pegasus spyware was linked to the death of a Mexican journalist, a new lawsuit alleged the NSO Group and its spyware were also linked to the death of a Saudi journalist.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close