Nov 302015

Attackers have a variety of ways to commit fraud and may take advantage of busy time to sneak in a data breach.

Source: Cyber Monday: What Retailers & Shoppers Should Watch For

Nov 292015

More than just a point-of-sale card scraper, it’s modular malware, and every module is a rootkit.

Source: Stealthy ModPOS Is ‘Most Sophisticated PoS Malware’ Ever

Nov 282015

Dell installs root certificate with associated private keys to create its very own Superfish scenario.

Source: Dell Hands Hackers Keys To Customer Systems

Nov 282015

Nov 272015

Nov 262015

Meg Whitman, the chairman, president and CEO of Hewlett-Packard, is interviewed on the floor of the New York Stock Exchange Thursday, Aug. 21, 2014. (AP Photo/Richard Drew) It’s official – Hewlett Packard, the iconic Silicon Valley computer maker, splits in to two companies today. Each of them will be a Fortune […]

Source: What The HP Split Means For Cybersecurity – Forbes

Nov 252015

Along with high instances of botnet communication and malware distribution, widespread POODLE and FREAK vulnerabilities were found across industries.

Source: Energy, Utilities Sector Fares Worse Than Retail in Security – Infosecurity Magazine

WordPress Appliance - Powered by TurnKey Linux