• FBI: We don’t want a government backdoor, just access to encrypted data

    News roundup: Despite the benefits of encryption, FBI Director James Comey says it inhibits legal investigations. It's up to tech companies to help. Plus: Major "computer glitches"; Kali 2.0 and more.

    Sharon Shea915 pointsBadges:
  • How to tell a security backdoor from a vulnerability

    Security backdoors and security vulnerabilities can often be confused with one another. Expert Michael Cobb offers guidance on distinguishing the two.

    SearchCloudSecurity4,140 pointsBadges:
  • US acts to restore faith in encryption standard after NSA backdoor revelation

    The US tries to restore faith in a widely used encryption standard after Edward Snowden leaked documents showing the NSA has a backdoor

    WAshford7,140 pointsBadges:
  • How attackers install backdoors, and what to do about it

    How did that backdoor get there? If you've ever found yourself asking this question, then find out how they get there and how to stop them.

    Tony Bradley595 pointsBadges:
  • Trend Micro Password Manager flaw; backdoors and passwords

    In this roundup, Trend Micro's Password Manager flamed over JavaScript flaw; Android malware breaks two-factor authentication; Cisco vulnerabilities; Juniper backdoor update and more.

    Peter Loshin935 pointsBadges:
  • Locking the backdoor: Reducing the risk of unauthorized system access

    Rampant backdoors in enterprise IT products too often provide unauthorized access to attackers and governments. Learn how to defend against the risks.

    searchsecurity25,340 pointsBadges:
  • Detecting backdoors: The Apple backdoor that never was?

    The debate over the purported Apple backdoor leaves enterprises asking, "When is a backdoor not a backdoor?" Application security expert Michael Cobb explains the difference.

    SearchCloudSecurity4,140 pointsBadges:
  • Tech experts warn against law enforcement backdoors

    International cryptographers and computer scientists warn exceptional access to data for law enforcement could open doors for criminals and malicious nation states

    WAshford7,140 pointsBadges:
  • China and US cross swords over software backdoors

    Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software

    WAshford7,140 pointsBadges:
  • How attackers install backdoors and what to do about it

    How did that backdoor get there? If you've ever had this thought, there are a couple things you should know, according to Tony Bradley. In this article, he looks at how backdoors are installed, how to keep them from being installed and how to track them down.

    Tony Bradley595 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.