Nov 302015
 

Attackers have a variety of ways to commit fraud and may take advantage of busy time to sneak in a data breach.

Source: Cyber Monday: What Retailers & Shoppers Should Watch For

Nov 292015
 

More than just a point-of-sale card scraper, it’s modular malware, and every module is a rootkit.

Source: Stealthy ModPOS Is ‘Most Sophisticated PoS Malware’ Ever

Nov 282015
 

Dell installs root certificate with associated private keys to create its very own Superfish scenario.

Source: Dell Hands Hackers Keys To Customer Systems

Nov 282015
 

http://krebsonsecurity.com/2015/11/breach-at-it-automation-firm-landesk/

Nov 272015
 

http://www.cio.com/article/3005340/state-sponsored-cyberspies-inject-victim-profiling-and-tracking-scripts-in-strategic-websites.html

Nov 262015
 

Meg Whitman, the chairman, president and CEO of Hewlett-Packard, is interviewed on the floor of the New York Stock Exchange Thursday, Aug. 21, 2014. (AP Photo/Richard Drew) It’s official – Hewlett Packard, the iconic Silicon Valley computer maker, splits in to two companies today. Each of them will be a Fortune […]

Source: What The HP Split Means For Cybersecurity – Forbes

Nov 252015
 

Along with high instances of botnet communication and malware distribution, widespread POODLE and FREAK vulnerabilities were found across industries.

Source: Energy, Utilities Sector Fares Worse Than Retail in Security – Infosecurity Magazine

WordPress Appliance - Powered by TurnKey Linux