HSBC has hired the former director general of MI5 to help beef up its protection against cyber criminals.
Browsing: Malware and Vulnerabilities
A patchwork of Internet and digital security laws across the country has contributed to Canada’s new number three ranking worldwide as the country of choice for cyber-criminals to set up sites with advanced malware, according to a new study.
The smartphone market has never been so competitive. Since the iPhone reinvented the idea of what a smartphone could be in 2007, the choices available to the consumer have never been wider or more sophisticated.
The IT security market remains dominated by anti-malware vendors whose business model is based on the detection of new malware and selling subscription-based updates that block new malware as it is released.
Bromium was founded in 2010 with a mission to restore trust in computing.
Some hackers identify vulnerabilities – serving as the internet’s immune system – but new EU legislation fails to recognise their value, argues MEP
Secure Code Reviews (bringing someone in from outside of the team to review/audit the code for security vulnerabilities) and application Pen Tests (again, bringing a security specialist in from outside the team to test the system) are both important practices in a secure software development program.
The clock is ticking as web applications take center stage as the point of entry for malicious activity and development teams are asked to deliver new applications at breakneck speed.
Mobile network giant Telefonica has launched new business unit Eleven Paths, which promises unprovoked attacks on customers every day, in the interests of greater security.
Organizations Should Look for Ways to Involve Employees in Mitigating and Eliminating Threats Before they Happen…