Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Five Ways To Better Hunt The Zebras In Your Network

An article from dark reading about  employees, and their computers, who are doing something odd: At the recent RSA Conference in San Francisco, Chris Larsen, a malware researcher at Web security firm Blue Coat Systems, talked about zebras. Not the kind on that roam the African savannah, but the kind that sit at computers behind […]

Bypassing Android encryption by freezing android phones

German Security Researchers have discovered that freezing an Android phone allows hackers to access the Encrypted data stored in the phone. The encryption method introduced in the Android version “Ice cream sandwich” by Google.  The researchers bypassed this encryption system method by freezing the smartphone for an hour.   To read more click here:  

Five Ways To Better Hunt The Zebras In Your Network

An article from dark reading about  employees, and their computers, who are doing something odd: At the recent RSA Conference in San Francisco, Chris Larsen, a malware researcher at Web security firm Blue Coat Systems, talked about zebras. Not the kind on that roam the African savannah, but the kind that sit at computers behind […]

Bypassing Android encryption by freezing android phones

German Security Researchers have discovered that freezing an Android phone allows hackers to access the Encrypted data stored in the phone. The encryption method introduced in the Android version “Ice cream sandwich” by Google.  The researchers bypassed this encryption system method by freezing the smartphone for an hour.   To read more click here: