Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Spoofing

Below you will find reports with the tag of “Spoofing”

image from Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry

Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology.

(more available)
Added: October 22, 2018
image from DDoS Threat Report Q3 2017

DDoS Threat Report Q3 2017

This report takes a look at the DDoS threats that occurred in the third quarter of 2017.

Added: October 21, 2018
image from Email Impersonation Attacks: A Clear And Present Danger

Email Impersonation Attacks: A Clear And Present Danger

Sponsored by Valimail, Email Impersonation Attacks: A Clear & Present Danger, was conducted by Ponemon Institute to understand the challenges organizations face to protect end-users from email threats, such as impersonation attacks.

(more available)
Added: October 21, 2018
image from Mobile Wi-Fi Security Report

Mobile Wi-Fi Security Report

This report is designed to inform you of the many dangers of Wi-Fi, and how to deal with them.

Added: October 21, 2018
image from Quarterly Threat Report Q3 2017

Quarterly Threat Report Q3 2017

This Quarterly report offers key takeaways from the third Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 21, 2018
image from TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus

This report provides an analysis of TPM Genie. TPM Genie is a serial bus interposer which has been designed to aid in the security research of Trusted Platform Module hardware. The tool demonstrates that a man-in- the-middle on the TPM serial bus can undermine many of the stated purposes of the TPM such as measured boot, remote attestation, sealed storage, and the hardware random number generator.

(more available)
Added: October 21, 2018
image from Advancing To Bot Management And Security

Advancing To Bot Management And Security

This report discusses the use of Bots in managing security risks for an organization. It specifically discusses the issures related to credential stuffing.

(more available)
Added: October 20, 2018
image from 4th Annual State of Application Security Report (2015 Mid-Year Report)

4th Annual State of Application Security Report (2015 Mid-Year Report)

Arxan and iThreat Cyber Group (ICG) analyzed data collected by ICG over the past 3.5 years that looked at the distribution of pirated software and digital assets on the Dark Web (i.e., the portion of content on the World Wide Web that is not indexed by standard search engines) and indexed sites that are focused on distributing pirated releases.

(more available)
Added: October 19, 2018
image from DDoS Threat Report Q2 2017

DDoS Threat Report Q2 2017

This report takes a look at the DDoS threats that occurred in the second quarter of 2017.

Added: October 19, 2018
image from Quarterly Threat Report Q2 2017

Quarterly Threat Report Q2 2017

This Quarterly report offers key takeaways from the second Quarter of 2017. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 19, 2018
image from Quarterly Threat Report Q1 2018

Quarterly Threat Report Q1 2018

This Quarterly report offers key takeaways from the first Quarter of 2018. Those takeaways come from Email, Exploit Kits, Web-Based Attacks, and Social Media and Domain Research.

(more available)
Added: October 18, 2018
image from DDoS Threat Report Q1 2018

DDoS Threat Report Q1 2018

This report takes a look at the DDoS threats that occurred in the first quarter of 2018.

Added: October 17, 2018
image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from DMARC Intelligence Report 2016

DMARC Intelligence Report 2016

In this annual report, they track the progress of Domain-based Message Authentication, Reporting, and Conformance (DMARC)

Added: October 15, 2018
image from Email Fraud Threat Report Year In Review

Email Fraud Threat Report Year In Review

The details in this report are compiled from Proofpoint’s specific research and experience from the events of 2017.

Added: October 15, 2018
image from Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

Enterprise IoT Security Blueprint: Requirements, Components, And Guidelines

This paper provides a guide of all of the things an Enterprise should consider and implement in order to secure the Internet of Things.

(more available)
Added: October 15, 2018
image from Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks.

(more available)
Added: October 15, 2018
image from Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

Preventing Abuse Of Privacy Sensitive Sensors Via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applica- tions may perform operations using privacy-sensitive sen- sors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the op- erations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were ob- tained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations.

(more available)
Added: October 15, 2018
image from Business Email Compromise (BEC) Attack Trends Report

Business Email Compromise (BEC) Attack Trends Report

This report is a breakdown of Agari’s experience with Business Email Compromise and attacks.

Added: October 14, 2018
image from The 2016 Call Center Fraud Report

The 2016 Call Center Fraud Report

This report will provide insights about the depth and breadth of fraud activity across a variety of industries from a data set of more than half a billion calls.

(more available)
Added: October 14, 2018
image from Top Ten DNS Attacks

Top Ten DNS Attacks

This report takes a look at the top ten DNS attacks.

Added: October 14, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)