The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus
WEDNESDAY, SEPTEMBER 02, 2015

Latest Comments

Social Networks

    #tokenization translates as replacing sensitive data elements with their non-sensitive equivalents. The value of the resulting elements being non-exploitable, this #security procedure is supposed to reduce the risks. In order to retrace the steps back to the original sensitive data, the tokenization system provides a mapping procedure. This reverse procedure needs the tokenization system and […]

    Read more ...

    While smartphones and tablets continue to have more features, which help, make our lives easier, their battery life isn’t usually something which users are happy with. Now, whilst the manufacturers are working on extending its shelf life, the batteries are in the spotlight for another reason. This time, the engine of these mobiles is putting […]

    Read more ...

    In EMEA, organizations are being pre-emptive about security due to the increasing threat posed by targeted attacks. These threats take the form of cyber-attacks that lie dormant inside the network for months and even years, exfiltrating valuable company data for illicit financial gain. The severe repercussions have prompted MSSPs to expand their offerings to protect […]

    Read more ...

    If you’re a Linux user, especially a systems administrator, the Linux Foundation has some security tips to share with you, and they’re quite good. Konstantin Ryabitsev, the Foundation’s director of collaborative IT services, published the security checklist that the organization uses to harden the laptops of its remote sysadmins against attacks. The recommendations aim to […]

    Read more ...

    Researchers have discovered a new strain of iOS malware dubbed KeyRaider that targets jailbroken devices and has the ability to steal certificates, private keys, and Apple account information. The malware already has claimed the private Apple account data of more than 225,000 victims. The KeyRaider malware was discovered by researchers at Palo Alto Networks, who […]

    Read more ...