Secure card reader authentication for iPhone
MagTek launched iDynamo, a secure card reader authenticator, specifically designed to interface with card present payment applications made for the iPad, iPhone 3G and 3GS, …
Microsoft patches 25 vulnerabilities
In today’s Patch Tuesday, Microsoft delivers 11 security bulletins to address 25 vulnerabilities affecting Windows, Office and Exchange. Five bulletins are rated …
15 vulnerabilities patched in Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.1 (and earlier versions) for Windows, Macintosh, and UNIX, Adobe Acrobat 9.3.1 (and earlier versions) for …
The lazy programmer’s guide to secure computing
This presentation starts with a simple block of code written by the Lazy Programmer, to observe how laziness made the code more compact and simpler. We then define the …
Apache.org hit by XSS, bruteforce attack
The Apache Software Foundation is the latest victim of a targeted attack aimed at its infrastructure – more specifically, at the SliceHost server (brutus.apache.org) …
Google’s priorities: Security and mobility
The future of computing is mobile. This statement has been repeated time and again by many people in the computer industry, and yesterday was Eric Schmidt’s turn to say …
10 online safety tips
Parents and teachers should avoid overlooking the dangers associated with the Web and the risks they pose to children. Kids today are fascinated by the Internet and extremely …
Medical records secured by code-changing algorithm
Medical records databases are a treasure trove for researchers – mapping trends in diseases and studying them to discover better treatment methods has never been easier. …
New Data Loss Prevention solution from CheckPoint
Check Point announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting …
Future air travel security risks, privacy and social implications
The European Network and Information Security Agency (ENISA) has analyzed the risks associated with a future air travel scenario, enabled with “Internet of …
President’s death used for fake AV peddling
Scammers are taking advantage of the people’s interest in the news of the tragic death of Poland’s President Lech Kaczynski to peddle their fake AV software. By …
Farm Town players targeted by malvertisements?
Players of the popular Facebook game application Farm Town are warned not to fall for the fake security warnings claiming that the user is infected by a virus that pop up …
Featured news
Resources
Don't miss
- The roles and challenges in moving to quantum-safe cryptography
- Product showcase: Blokada for Android gives users control over network traffic
- Passwords are still breaking compliance programs
- Pharma’s most underestimated cyber risk isn’t a breach
- AI security risks are also cultural and developmental