LinuxSecurity Contributor - Pooja Shah
Pooja Shah
Articles From Pooja Shah
1 - 2 min read
Government's role in Cybersecurity
17 August 2015
At the DarkReading News Desk, live from Black Hat, industry experts Dan Kaminsky, Richard Bejtlic
Government
1 - 2 min read
How a Career Con Man Led a Federal Sting That Cost Google $500 Million
15 May 2013
Whitaker began by explaining his business
Government
1 - 2 min read
Tough Times at Homeland Security
15 May 2013
A new wave of cyberattacks is hitting American companies at a particularly vulnerable time for the
Government
1 - 2 min read
Printer Networks Vulnerable to Hackers: Report
29 January 2013
Printers using server software offered by Hewlett-Packard (HP) are reportedly vulnerable to attack.
Network Security
1 - 2 min read
With weak passwords continuing, blame turns to security pros
25 October 2012
"Jesus" was among the new entries in SplashData's annual list of worst passwords used on the Interne
Intrusion Detection
1 - 2 min read
Hackers Sell Access to Fortune 500 Computers
23 October 2012
Unauthorized access into the networks of Fortune 500 companies is only few dollars and clicks away,
Intrusion Detection
1 - 2 min read
Hotel door tech provider moves to crack down on lock hacker
27 August 2012
An electronic hotel lock provider has issued a series of fixes to its technology after a cheeky deve
Intrusion Detection
1 - 2 min read
Antisec Hits Private Intel Firm; Millions of Docs Allegedly Lifted
28 December 2011
The Antisec wing of Anonymous revealed on Saturday that it had compromised the servers of the privat
Intrusion Detection
1 - 2 min read
Vulnerability analysis for IPv6 networks
01 July 2011
Security Manager 1.5 is a revamped version of Greenbone's security appliance; it is now able to test
Intrusion Detection