ISC West is the largest physical security show in North America featuring over 1,000 exhibitors in one place in just 3 days.The business programs of critical education will keep you informed on the most relevant products, ...
Tags: Footprints
RSA, the security division of EMC, yesterday hosted its Security Summit, a one day security conference in Dubai aimed at helping organisations address evolving, complex and sensitive security challenges. The Summit, held at the Jumeirah ...
Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone. Apple said in an email to AFP that it "has never ...
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks. A phishing attack ...
Tags: Computer Products, software
The US National Security Agency (NSA) is attempting to beef up its security by letting go of 90 per cent of its system administrators, automating their roles instead. The NSA has faced increased scrutiny after former contractor Edward ...
Tags: NSA, System Administrators
Many door and window sensors, motion detectors and keypads that are part of security systems used in millions of homes and businesses can be bypassed by using relatively simple techniques, according to researchers from security consultancy ...
Tags: Office Security Systems
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
As SAP invests heavily in mobile, a security testing company will release a tool next month to ensure mobile-accessible SAP systems are not vulnerable to hackers. Boston-based Onapsis will release a new module for its X1 security suite, a ...
Tags: SAP systems, Computer Products, software
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to ...
Tags: SAP Security, HTTP Services
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Security researchers found serious vulnerabilities in the engines of several popular first-person shooter video games that could allow attackers to compromise their online servers and the computers of players accessing them. Security ...
Tags: Computer Products, software, video games
Santander head of operation risk, Michael Paisley, has warned that the industry needs to take a wider view of risk to cover all angles of information security. Speaking on a panel at the Information Security Conference in London, Paisley ...
Tags: Computer Products, software
The UK continues to struggle against cyber criminals with no clear victory in sight. That's what the House of Commons Home Affairs Committee heard from the cyber security industry as experts gave evidence about e-crime. "I don't think the ...
Tags: Computer Products, software
Chloe Smith, minister for political and constitutional reform at the Cabinet Office, has said the government's £650m spend on cyber security "underlines the importance" the government places on the UK's safety. Describing the ...
Tags: Computer Products, software