HID Global has offered four tips for protecting organizations against the types of data breaches that recently occurred at Target and other major retailers.
Browsing: Malware and Vulnerabilities
What should users do about it? Upgrade, of course. But in the event that’s not practical or possible at the moment, then users should be super-mega vigilant
A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping
Following the news that Basecamp was hit by an extortion based DDoS attack, there are three comments below from security experts.
PandaLabs today released a warning of a malicious spam campaign making use of a story on the reputable BBC website to add credence to the phishing attempt.
Kaspersky Lab have revealed its Spam analysis for February 2014. It found that many malicious attachments in February’s spam came in emails
From a private perspective, as a user of the Internet in today´s Internet of Things, Windows XP will remain a security and privacy nightmare.
If there is one person in an organization that knows which information has to be protected against data loss or theft, the business manager is it.
With official support for Windows XP set to end on April 8th, the information security community is going to have to deal with the threat and the noise.
These spread sheets were hosted on a UK based site for 3 weeks until July 2012 before the breach was reported to the Information Commissioner’s Office