At the ASIS International Conference (ASIS 2015), Genetec™, a leading manufacturer of open-platform, unified IP security solutions, and Sensity®Systems Inc., the pioneer of light sensory networks (LSNs), announced a strategic ...
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
It's not possible for an organisation to be aware of and secure every mobile device on the network, not matter how much the IT department tries, because staff will always connect their own smartphones and tablets to the office wireless ...
Tags: Computer Products, software, network
The key to a secure bring-your-own-device (BYOD) implementation is to treat staff as security specialists, according to Intel's Rob Evered, the company's senior information security technologist and strategist. "We have got about 60,000 ...
Tags: Computer Products, software
The owners of the Auburn SuperMall (Auburn, WA) are very conscientious of energy consumption and implemented a lighting retrofit upgrade four years ago to cut energy consumption. During recent events, the mall management team learned of ...
Colleges and universities are being encouraged to scrutinize their systems to keep them from being hijacked in DDoS (distributed denial-of-service) attacks. The Research and Education Networking Information Sharing and Analysis Center ...
Santander head of operation risk, Michael Paisley, has warned that the industry needs to take a wider view of risk to cover all angles of information security. Speaking on a panel at the Information Security Conference in London, Paisley ...
Tags: Computer Products, software
Home furnishing giant Nebraska Furniture Mart will soon be arming some of its security employees as well as allowing in armed consumers who hold permits to carry concealed weapons, The Omaha World Herald is reporting. The news comes as ...
Tags: Nebraska Furniture, Furniture, furnishing
The Cyber Security Challenge, a series of national events designed to encourage talented professionals to join the UK IT security industry, has just announced its latest winner, 28-year-old chemist Stephen Miller. Government cyber ...
Tags: Cyber Security Challenge, IT security industry, cyber security
According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial and E-Commerce ...
The UK and India are expected to strike a deal to become trusted partners in the growing battle against cyber criminals and nation states, prime minister David Cameron has said. Reuters reports that the UK hopes that by setting up a joint ...
BIG business is being targeted by cyber-criminals in "ransomware" attacks, threatening deletion or freezing of crucial business files unless money is paid. A new national survey of Australian big business reports that in September last ...
Tags: TriQuint, IT security, firewalls
Arms vendors are moving into the cyber security sector in response to a decline in sales of their traditional weapons, according to the Stockholm International Peace Research Institute It is the first time that annual arms sales have ...
Tags: cyber security, Arms, annual arms sales
A disgruntled employee, angry at missing out on a pay rise, conducted a three-year campaign of sabotage against his company's computers by spraying the cleaning product Cillit Bang into the grills of the servers. Credit controller Edward ...
The UK has joined 25 countries in committing to a set of principles intended, they claim, to make digital networks more secure and resilient. Foreign secretary William Hague signed the World Economic Forum's Partnering for Cyber ...
Tags: digital networks, Cyber Resilience, UK Cyber Security Strategy U