2.4M cards compromised in US supermarket chain breach
Popular US supermarket chain Schnucks has announced on Monday that some 2.4 million credit and debit cards used at 79 of its 100 stores may have been compromised during a four …
Pass-thoughts as a solution to the password problem
A group of researchers from University of California, Berkeley, claims to have achieved 99 percent accuracy when using brainwave signals instead of passwords for user …
Big Data: Huge risk or huge opportunity?
The amount of data government agencies must capture, store, and analyze is growing exponentially. Whether this data boom provides agencies with new opportunities to gain …
Disruptive tech trends that will change everything
At the opening keynote for the 43rd annual ISACA North America Computer Audit, Control and Security (CACS) Conference, New York Times personal-technology columnist David Pogue …
Study of the European data center market
Digital Realty Trust has released key findings from its annual study of the European data center market. The survey of senior leadership at large corporations in Europe …
Radware unveils SDN strategy
Radware introduced DefenseFlow, the first in the company’s suite of Software Defined Networking (SDN) applications providing organizations with network wide attack …
WordPress sites targeted by mass brute-force attack
US-CERT has issued an alert regarding the ongoing massive brute-force attacks against WordPress sites, warning users and administrators to keep their installation always …
The Social-Engineer Toolkit 5.0 released
TrustedSec released the Social-Engineer Toolkit (SET) 5.0 codename: The Wild West. This version is a culmination of six months of development, bug squashing, and user …
Set your Google account to be deleted after you die
Google has rolled out an interesting feature: the Inactive Account Manager. Aimed at providing some peace of mind for privacy minded users that worry what will happen with …
Mobile malware up 163%
Mobile malware threats increased 163% to more than 65,000 in 2012, according to NQ Mobile. The problem is becoming more complex as smarter mobile malware can better target …
FAA and EASA say hijacking planes using an app is not possible
The big news last week was that, according to researcher Hugo Teso, it is possible for malicious individuals to take control of an airplane using a special framework and an …
Cloud-based security services still in high demand
By 2015, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner. The services are also driving changes in the …