1
  • China and US cross swords over software backdoors

    Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software

    WAshford3,770 pointsBadges:
  • Locking the backdoor: Reducing the risk of unauthorized system access

    Rampant backdoors in enterprise IT products too often provide unauthorized access to attackers and governments. Learn how to defend against the risks.

    searchsecurity23,025 pointsBadges:
  • FBI: We don’t want a government backdoor, just access to encrypted data

    News roundup: Despite the benefits of encryption, FBI Director James Comey says it inhibits legal investigations. It's up to tech companies to help. Plus: Major "computer glitches"; Kali 2.0 and more.

    SharonShea520 pointsBadges:
  • Tech experts warn against law enforcement backdoors

    International cryptographers and computer scientists warn exceptional access to data for law enforcement could open doors for criminals and malicious nation states

    WAshford3,770 pointsBadges:
  • US acts to restore faith in encryption standard after NSA backdoor revelation

    The US tries to restore faith in a widely used encryption standard after Edward Snowden leaked documents showing the NSA has a backdoor

    WAshford3,770 pointsBadges:
  • Detecting backdoors: The Apple backdoor that never was?

    The debate over the purported Apple backdoor leaves enterprises asking, "When is a backdoor not a backdoor?" Application security expert Michael Cobb explains the difference.

    SearchCloudSecurity3,325 pointsBadges:
  • How attackers install backdoors and what to do about it

    How did that backdoor get there? If you've ever had this thought, there are a couple things you should know, according to Tony Bradley. In this article, he looks at how backdoors are installed, how to keep them from being installed and how to track them down.

    Tony Bradley595 pointsBadges:
  • Detect and mitigate Java backdoors that enable botnet communication

    Nick Lewis offers advice on detecting a particular strand of malware that utilizes a Java backdoor to enable botnet communication.

    editor13,495 pointsBadges:
  • How attackers install backdoors, and what to do about it

    How did that backdoor get there? If you've ever found yourself asking this question, then find out how they get there and how to stop them.

    Tony Bradley595 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following