The U.S. government, finally realizing that it has to take action to ensure a minimum level of cybersecurity in networks that manage the nation's energy, water and financial services, presented the Framework for Improving Critical ...
Tags: Consumer Electronics
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
For the first time since it redefined the smartphone market in 2007 with the launch of the iPhone, Apple will sell two distinctly different versions of the handset intended to attract consumers in different markets. “The iPhone 5 ...
Tags: Wider Market, iPhones
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
While mobile payments transform financial life in many less developed countries, retailers and payment providers in the U.S. and Europe are still trying to find the right incentives to drive adoption. The added convenience of mobile ...
Tags: Mobile Payments, credit cards
The lack of security in communication technologies used in the aviation industry makes it possible to remotely exploit vulnerabilities in critical on-board systems and attack aircraft in flight, according to research presented Wednesday at ...
CIO - When it comes to securing business-technology systems, CIOs face a challenge that won't go away. The problem isn't necessarily new attack techniques, insecure software or even the latest government regulations. Rather, it's the ...
Tags: CIOs, CSOs, business technology systems, techniques, software
U.S.-based corporations and government agencies have been shipping application development work to offshore IT services providers for years. Now, thanks to cloud computing, foreign companies are starting to bring their business to ...
Tags: U.S., Cloud, IT, IT services
UK security services have begun bridging the gap that has stopped open source software getting security clearance for use in government systems. The initiative has come too late to stop the first big contract wins delivered under the ...
Lack of security in the cyber world is one of the most significant threats faced by the civilized world, according to Jarno Limnell, director of cyber security at security firm Stonesoft. "But it seems that we have to experience a ...
Tags: lack of security, cyber world, cyber security, digital resources
A fifth of lost electronic devices have access to work email,exposing confidential corporate information,a Sophos survey has revealed. Some 42%of lost devices do not have any basic security measures in place,according to a survey ...
Tags: electronic devices, work email, security, Sophos
The value of data to cyber criminals Plan for cyber attacks Defence in depth against cyber attack Comprehensive approach to APTs Stuxnet,Duqu,Flame,and Gauss have nothing to do with businesses that are not involved in finance and critical ...
Tags: cyber criminals, cyber attack, OTMS, IT security
Retail chip and PIN devices can be attacked easily,exposing banks,retailers and customers to fraud. Researchers from Basingstoke-based MWR InfoSecurity demonstrated at the 2012 Black Hat conference in Las Vegas that it is possible to ...
Tags: Retail chip and PIN devices, MWR Infosecurity, 2012 Black Hat, Las Vegas