HMRC breach recommendations being ignored
24 months since the publication of the Poynter report which was commissioned after the HMRC breach, and almost three years since the original misplaced discs came to light, …
zPOD puts your PC in your pocket
Zinstall announced zPOD, a privacy-enhanced mobile computing appliance which lets users instantly use their complete familiar environment on any available computer. zPOD …
Payment processing security trends in the catering industry
The catering industry has for some time now emerged as one of the businesses most affected by security breaches and card and identity theft. In reply to the increased threat, …
Users of Habbo Hotel virtual world hit by thieves
If you’re not an online gamer or a user of virtual worlds, it is easy to make light of the occasional news of account hijacking or thefts of virtual goods or money. …
Researchers develop malware to devise protection against it
Malware action – security reaction. In most cases, security researchers and professionals are bound to this vicious cycle, but there are some that have taken steps to …
IT pros are hacking their own enterprises to keep intruders out
A survey of IT security professionals has discovered that 83% consider commercial applications, the ones you buy off the shelf, to be riddled with code flaws and …
Popular websites distribute spyware-infected Mac software
Intego has discovered a spyware application that is installed by a number of freely distributed Mac applications and screen savers found on a variety of websites. This …
USB reader combines flash memory with contactless smart card technology
HID Global announced a portable, dongle-sized USB smart card reader that includes a removable MicroSD flash memory slot and reader for SIM-sized contactless smart cards. By …
To hack or not to hack MSN accounts
A mass mail invitation to a suspicious “do-it-yourself” account hacking session puts Windows Live Messenger users at risk. The e-mail marking the first step of …
The risks when networks collide
The increasing convergence of multiple networks for voice, data, video and other services onto a single infrastructure based on IP, has the potential to leave serious gaps in …
Three indicted in $100 million scareware fraud scheme
An international cybercrime scheme caused Internet users in more than 60 countries to purchase more than one million bogus software products, causing victims to lose more than …
Bizploit ERP penetration testing framework
Bizploit is the first open source ERP penetration testing framework. Developed by the Onapsis Research Labs, Bizploit assists security professionals in the discovery, …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage