Tag: Hacker

Who goes there? Why router authentication may be an ISP’s weakest link

Many ISPs underestimate the level of risk to their own backend infrastructure from poorly secured household routers. The growing use of intelligent CPE to deliver data-centric, value-added services to the home in concert with cloud-based servers means that routers are now more tightly coupled to the service provider’s core network than ever before. This blog outlines the dangers to ISP revenue, reputation and quality of service if CPE authentication processes are inadequate. We’ll also look at how ISPs can add a trusted and unclonable identity into each device to safeguard the integrity of their own network and services.

Read More

Why application security testing is only half the battle

With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.

Read More

Crack Kills

In the dictionary, a “Window of Opportunity” is defined as “a favorable opportunity for doing something that must be seized immediately if it is not to be missed.” For video and online game publishers, the window of opportunity for a new game is pretty short. Fourteen days short, to be exact.

Read More
Loading