IT departments have easiest access to sensitive data
CEOs of modern companies often lack access to their own sensitive data, according to Venafi. When asked who had the easiest access to their company’s most sensitive …
2012 network security trends
Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …
Rise of unencrypted cards
71 percent of merchants were found to store unencrypted payment card data in 2011, which is an increase of 8 percent since 2010, according to a study by SecurityMetrics. …
Week in review: Facebook bug gives access to private photos, zero-day exploited in ongoing attacks, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, articles and interviews: IT pros can’t resist peeking at privileged information IT security …
Multimillion credit card data theft
Four Romanian nationals were charged for their alleged participation in an international multimillion dollar scheme to remotely hack into and steal payment card data from …
Six arrested for phishing scam targeting students
Four men and two women suspected of having taken part in a sophisticated phishing scam that targeted hundreds of UK students were arrested by the Met’s Police Central …
Telstra privacy blunder reveals account details of some 1m customers
Personal and account details of over one million customers of Australian telecom giant Telstra were accessible to any Internet user – and may have been taken advantage …
EU wants firms to stop selling surveillance tools to repressive regimes
We are all aware of the fact that some regimes have no qualms about spying on their citizens in order to keep tabs on dissenters. Nevertheless, last week’s revelation by …
Delivering banking Trojan via malicious boot loaders
Brazil is a country whose Internet users are targeted almost exclusively by cyber crooks wielding banking Trojans. It is also a country where a majority of users still runs …
Top security predictions for 2012
As December rolls in and 2012 looms on the IT security horizon, Tufin Technologies – the security lifecycle management specialist – has come up with its top five …
Tips to stay protected online
Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …
Download.com “cleans up” Nmap but not other downloads
When he discovered that Nmap was being distributed by C|Net’s Download.com site bundled up with a proprietary trojan installer that installed a sketchy toolbar, changed …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground