Product/Market

Share this Post

figure1_current_CCCRA_members

CC (Common Criteria) Certification FAQ 2016-01-06 15:27:52

  In security field, CC stands for Common Criteria. CC certification has been approved as the International standard (ISO/IEC 15408) following the given evaluation criteria for cross-certifying evaluation result and unifying different criteria among countries. In case of Korea, issuing…

Stegosploit -

Stegosploit – Exploit inside the pixels of an image 2015-10-16 18:43:34

Stegosploit – Exploit inside the pixels of an image   1. What is Stegosploit? Stegosploit, Steganography* + Exploit, is a bug found by Saumil Shah, a security…

The functions of the Next-Generation IPS

The Features of a Next-Generation IPS 2015-09-24 10:16:36

The Features of a Next-Generation IPS   The Importance of the Next-Generation IPS Cyber criminals in early days attacked the vulnerability of server or applications performed inside the server as the main targets, so the previous IPS system has evolved…

Drive-By Download

Techniques utilizing Exploit Kit and Kit’s growth model 2015-08-04 09:50:47

Techniques utilizing Exploit Kit and Kit’s growth model   Let us introduce you some techniques utilizing Exploit Kit, a malware distribution tool which has recently attracted a huge attention from all over the world. We will also talk about how…

NEXG_M2MG 10_exterior_ENG

Application of M2M secure gateways for industry 2015-07-07 14:03:30

  Application of M2M secure gateways for industry   Let us introduce some examples of applying Hansol NexG’s M2M secure gateways for industry, NexG M2MG 10(LS_LTER).   NexG M2MG 10 exterior NexG M2MG 10 was developed for applications at industrial…