The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus
MONDAY, AUGUST 03, 2015

Latest Comments

Social Networks

    A #business #payment #security survival #guide is a useful tool for small businesses. Anyone looking to start an #online store, or already established businesses trying to countercheck or improve their security procedures could benefit from such information. When outsourcing the payment facility, trained experts handle the cybersecurity tasks, so the issue is professionally covered. Cyber […]

    Read more ...

    If you are in charge of defending IT systems you know there’s a big difference between an attacker who is trying to steal payment card data and an aggressive assault by folks who wants to expose your internal emails and trash your servers and/or reputation. In the last twelve months we’ve seen a number of […]

    Read more ...

    In spite of self-congratulatory pats on the back from several corners of the security world, this week’s decision from the Commerce Department’s Bureau of Industry and Security (BIS) to rewrite the proposed U.S. implementation of the Wassenaar Arrangement rules was an expected outcome—albeit an unusual one. A 60-day comment period ended on July 20 and […]

    Read more ...

    Of all the malware online, Remote Access Trojans (RATs) account for nearly 70 percent. A new report from Digital Citizens Alliance, a self-described coalition focused on internet threats, deep dives into the RATs world with a particular focus on YouTube. The group’s eight-month research period brought up thousands of RAT tutorials on YouTube, the group […]

    Read more ...

    Credit card #data isn’t quite the mother lode it once was for cyber thieves. Not only is its useful life generally brief, it also isn’t worth as much as it used to be. But cyber criminals are, among other things, adaptable. As Daniel Berger, CEO of #redspin puts it, “hackers are bad guys but good […]

    Read more ...