Researchers beat Google’s Bouncer

When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …

Detect and shut down rogue mobile apps

To counter the emergence of malicious and unauthorized apps appearing on mobile app stores, RSA introduced the RSA FraudAction Anti Rogue App Service designed to detect and …

Hidden security risks of top mobile apps

Appthority cast a spotlight on the hidden behaviors of the top free mobile apps. The report reveals the security issues raised by the BYOD movement, app market fragmentation …

CryptoAuditor: Privileged user access auditing

SSH Communications Security launched CryptoAuditor at the Black Hat USA 2012 conference. It helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with …

Win a free ticket to Black Hat Abu Dhabi 2011

Black Hat Abu Dhabi 2011 is scheduled to be held at the Emirates Palace in Abu Dhabi on December 14-15. Help Net Security is offering a free ticket to the Briefings part of …

A look into Black Hat’s wireless network

Aruba Networks, which provided and maintained the wireless network for last week’s Black Hat USA 2011 conference, today provided some interesting statistics around the …