Top 5 pitfalls for securing retail cardholder data
Recognizing the need for stronger protection against security threats, the Payment Card Industry (PCI), a consortium of retail and credit card leaders, published Data Security …
Advances in biometrics remedy the need for increased security
Security concerns in the present world continue to grow in intensity and complexity. This opens the door to many opportunities within the European biometrics market, which is …
Monitoring and theft recovery software for Windows Mobile
Retina-X Studios released RecoveryCop for Windows Mobile devices. When installed, it runs in stealth mode. Anytime thereafter they can monitor every move, action and sound of …
Cybercriminals exploit Natasha Richardson’s death
Users keen to get the latest news on Natasha Richardson’s death should be careful about which news story they read. There are compromised websites hosting content …
Attacking SMM memory via Intel CPU cache poisoning
System Management Mode (SMM) is the most privileged CPU operation mode on x86/x86_64 architectures. It can be thought of as of “Ring -2”, as the code executing in …
Internet Explorer 8 is now available
Microsoft unveiled Windows Internet Explorer 8, which can be downloaded in 25 languages. Microsoft claims IE 8 is easier to use, faster and offers security features in direct …
The most prominent types of Web application vulnerabilities
Cenzic released its report revealing the most prominent types of Web application vulnerabilities for the second half of 2008. The report, which comes in the wake of highly …
Man indicted for disabling offshore oil platform leak-detection system
A man who worked at a company that operated off-shore oil platforms was indicted on federal charges of damaging the company’s computer systems after it declined to offer …
Thunderbird 2.0.0.21 fixes security issues
Mozilla released Thunderbird 2.0.0.21 and the following security issues have been fixed. Upgrade PNG library to fix memory safety hazards Google security researcher Tavis …
Seven great concerns for CEOs in 2009
With CEOs facing unprecedented challenges ahead as businesses struggle with the realities of dealing with the economic downturn, Gartner, Inc. has identified the seven …
Imperva enhances database activity monitoring with analytics
Imperva announced a new version of its SecureSphere database activity monitoring (DAM) solution that adds analytics intelligence to automate forensic and audit investigations. …
Survey: Hosted email security can cut costs
Conducted by Osterman Research and commissioned by Trend Micro, a recent study found that more than 70 percent of respondents would consider hosted if it reduced their costs …
Featured news
Sponsored
Don't miss
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage
- What CISOs need to keep CEOs (and themselves) out of jail
- Secretive: Open-source app for storing and managing SSH keys in the Secure Enclave
- Leveraging dynamic configuration for seamless and compliant software changes