Posted on 1 August 2014. | The malware is capable of scraping the memory of POS systems for card track data, logging keystrokes, communicating with a C&C server and much more.
Posted on 31 July 2014. | With a growing dependence on technology we need to also accept there will be times when that technology is going to fail us, either by accidental or malicious intent.
Posted on 31 July 2014. | Researchers have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used USB-connected devices.
Posted on 30 July 2014. | Researchers have unearthed three privilege escalation zero-day bugs affecting Symantec Endpoint Protection.
Posted on 29 July 2014. | By combining the tools supplied by a cloud provider with external third party solutions, higher levels of security - not to mention peace of mind - are achieved.
Posted on 31 July 2014. | Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.
Posted on 30 July 2014. | Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.
Posted on 30 July 2014. | We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our information be as these wired and interconnected devices begin to permeate our lives?
Posted on 29 July 2014. | Tripwire CTO Dwayne Melancon spends a lot of time on airplanes, and ends up watching a lot of movies. Some of his favorite movies are adventures, spy stuff, and cunning heist movies. A lot of these movies provide great lessons that we can apply to information security.
Posted on 29 July 2014. | Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.