Security blogger Brian Krebs has reported that multiple sources in the banking industry say they have traced a pattern of…
Browsing: Malware and Vulnerabilities
I have been asked by several friends who are CISOs within different organizations if Capture the Flag (CTF) experience makes…
Technology vendors like to discuss the business value of our solutions, but we are often less keen to discuss deployment…
Simplicity is key to a secured enterprise Security is a unique IT discipline. It overlays and supports all other disciplines:…
Software presents a particularly vexing problem for most organisations. On one hand, enterprise applications are mission-critical, running every facet of…
CREST, CSA and AISP work together to introduce penetration testing certifications in Singapore CREST has signed a Memorandum of Intent…
The Android Stagefright bug is back and this time, the flaw allows an attacker to hack Android smartphones just by tricking…
First reported to Microsoft in Feb 2015 by MWR Labs, a ‘use-after-free’ vulnerability (now identified as CVE-2015-1642) was discovered that…
Experian, a vendor which processes T-Mobile’s credit applications, has been breached, putting 15 million T-Mobile customers at risk. Innocent users…
Range Rover and BMW theft rates soar in London A security expert claimed that the recent rise in thefts of…