Retailers warned of attacks using hard-to-spot PoS malware

Posted on 1 August 2014.  |  The malware is capable of scraping the memory of POS systems for card track data, logging keystrokes, communicating with a C&C server and much more.

Failure is an option

Posted on 31 July 2014.  |  With a growing dependence on technology we need to also accept there will be times when that technology is going to fail us, either by accidental or malicious intent.

Malicious USB device firmware the next big infection vector?

Posted on 31 July 2014.  |  Researchers have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used USB-connected devices.

0-days found in Symantec Endpoint Protection

Posted on 30 July 2014.  |  Researchers have unearthed three privilege escalation zero-day bugs affecting Symantec Endpoint Protection.

Layered security in the cloud

Posted on 29 July 2014.  |  By combining the tools supplied by a cloud provider with external third party solutions, higher levels of security - not to mention peace of mind - are achieved.

Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
Events
Black Hat USA 2014
02 August - 07 August 2014.
PasswordsCon 2014 Las Vegas
05 August - 06 August 2014.
Cyber Security EXPO 2014
08 October - 09 October 2014.

Editor's choice

The role of the cloud in the modern security architecture

31 July 2014. | Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.

Failure is an option

31 July 2014. | With a growing dependence on technology we need to also accept there will be times when that technology is going to fail us, either by accidental or malicious intent.

How security analytics help identify and manage breaches

30 July 2014. | Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, and much more.

375 million customer records compromised in 2014

30 July 2014. | For the first half of 2014, more than 375 million customer records were stolen or lost as a result of 559 breaches worldwide.

Using Hollywood to improve your security program

29 July 2014. | A lot of heist movies provide great lessons that we can apply to information security.

Layered security in the cloud

29 July 2014. | By combining the tools supplied by a cloud provider with external third party solutions, higher levels of security - not to mention peace of mind - are achieved.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //