Security

Cardless ATMs will improve security of cash withdrawalCardless ATMs will improve security of cash withdrawal

Cardless ATMs will improve security of cash withdrawal

A unit of Canada’s Bank of Montreal will launch on Monday its network of cardless ATMs, a technological innovation to…

10 years ago
Cyber attacks against Organizations increased once againCyber attacks against Organizations increased once again

Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report.…

10 years ago
ICS-CERT MONITOR report states most critical infrastructure attacks involve APTsICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

10 years ago
MPs Try to Ban Tor network for the Common Good, but Raise ConcernsMPs Try to Ban Tor network for the Common Good, but Raise Concerns

MPs Try to Ban Tor network for the Common Good, but Raise Concerns

Banning Tor network would bring a lot of public distress and would raise reactions, according to Governmental advisors and thus…

10 years ago
Google VPN – Revealed the Virtual Private Network serviceGoogle VPN – Revealed the Virtual Private Network service

Google VPN – Revealed the Virtual Private Network service

Pocketables revealed that Google is secretly working on a Virtual Private Network (VPN) service named Google VPN for use on…

10 years ago
Adobe issued the updates for 11 Critical VulnerabilitiesAdobe issued the updates for 11 Critical Vulnerabilities

Adobe issued the updates for 11 Critical Vulnerabilities

Adobe released security updates for Adobe Flash Player to fix 11 Critical Vulnerabilities, most of them Remote Code Execution flaws.…

10 years ago
Protecting sensitive data: an approach to prevent data exfiltrationProtecting sensitive data: an approach to prevent data exfiltration

Protecting sensitive data: an approach to prevent data exfiltration

Data exfiltration is mechanism to data breach that occurs when an individual’s or organization's data is illegally copied from its…

10 years ago
2,400 unsafe applications found in average large enterprise2,400 unsafe applications found in average large enterprise

2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large…

10 years ago
A new EU counter-terrorism unit will tackle extremists onlineA new EU counter-terrorism unit will tackle extremists online

A new EU counter-terrorism unit will tackle extremists online

The Eu plans for a new European counter-terrorism unit that  will tackle extremists online in a joint effort of law…

10 years ago
A new Facebook Worm exploits multiple cloud servicesA new Facebook Worm exploits multiple cloud services

A new Facebook Worm exploits multiple cloud services

Security Experts at Malwarebytes security firm spotted a new  Facebook worm that spreads itself by leveraging multiple cloud services. Social…

10 years ago