Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
EMI Music Publishing, has deployed a cloud-based IT service management software-as-a-service (SaaS) from Sunrise Software to support 900 users in 55 countries around the world. SaaS service management product Sostenuto took one week to ...
Tags: EMI Music Publishing, IT service, cloud computing, Sunrise Software
Unlicensed copies of popular software Keep up to date Patch applications with security updates Conficker still a threat Malicious key generation(keygen)software is one of the fastest-growing types of a malware,according to the latest ...
Tags: top cyber threats, malicious key, malicious keygen software
"Technology should be irrelevant," says Gavin Walker, CIO of the UK's air traffic control business, NATS. Walker is a firm believer in focusing on what IT can enable, rather than the technology for its own sake. As CIO, he heads a ...
Tags: Interview, NATS, air traffic control, virtual desktops
De Montfort University (DMU) in Leicester is launching a centre dedicated to cyber protection and the growing need for effective systems in the face of a growing cyber crisis. The creation of the Cyber Security Centre (CSC) is a direct ...
Tags: CSC, DMU, Cyber Security Centre, BIS
Retail chip and PIN devices can be attacked easily,exposing banks,retailers and customers to fraud. Researchers from Basingstoke-based MWR InfoSecurity demonstrated at the 2012 Black Hat conference in Las Vegas that it is possible to ...
Tags: Retail chip and PIN devices, MWR Infosecurity, 2012 Black Hat, Las Vegas