BitTorrent programs can be abused to amplify distributed denial-of-service attacks
Attackers could launch crippling attacks by reflecting the traffic through millions of computers running BitTorrent programs
Attackers could launch crippling attacks by reflecting the traffic through millions of computers running BitTorrent programs
The exploit he developed yields root access
Attackers could obtain credentials used to manage Google for Work accounts
Google has sent the patch to its partners and will fix its Nexus line of devices
The flaws could give attackers access to encrypted information
Third-party devices with cellular connectivity -- and security problems -- can tap into the heart of a vehicle's brain
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO, IBM ASEANZK