POS swipe Small - Copy

POS Under Attack: The Why, How & What to Do

Over the past year, there have been an alarming number of high profile data breaches of customer cardholder and personal information through compromises of retail Point-of-Sale (POS) systems. In December 2013, retail giant Target revealed that a breach of their…

computer fraudster

Homeland Security Warns Phishing Spreading Banking Malware

US Homeland Security sent out an alert this week about an email phishing campaign that is distributing the “Drye” (or Dryze) banking malware. Drye targets users of banking and financial sites to steal their login credentials and commit financial fraud.…

iStock_000017761745Large

White House Under Cyber Attack!

The White House has had several breaches of its physical security recently that have caused embarrassment and concern for the Secret Service. It now appears there needs to be concern for the White House’s cyber security defenses against cyber attack.…

secured lock - Copy

TLS vs SSL: The Difference May Surprise You!

When you work with SSL (Secured Sockets Layer) to secure your web site or other types of communication, you may notice reference to another communications protocol TLS, Transport Layer Security. You know that SSL provides a secured, encrypted communication between…

ATM security

ATMs Vulnerable to Malware Breaches

It is a commonly held myth that ATM machines are not vulnerable to the type of malware infections that plague other endpoint systems because they are more isolated from their network and end user interactions. While this makes them more…

computing security awards

Computing Security Mag Honors Comodo Endpoint Security

On October 9th, Computing Security Magazine named Comodo Endpoint Security Manager (CESM) the “Anti Malware Solution Of the Year for 2014” at their annual awards dinner at the Hotel Russell in London’s Russell Square. Computing Security Magazine is one of…

computer wromd

Understanding the Android SMS Virus “Selfmite”

Selfmite is a Worm, a category of computer virus. A worm contains malicious code that uses system networks to replicate themselves. They are major threat to a computer and network system. Worms do not require human intervention whereas viruses do.…

ZERO-DAY-CALENDAR

Microsoft Plagued By Zero Day Vulnerabilities

The opportunities for hackers and cybercriminals never seems to end. Microsoft issued a warning this week on an unpatched zero day vulnerability that threatens users of Windows PowerPoint. The issue comes on the heels of 3 critical zero day vulnerabilities…

help button

Staples POS Data Breach: Here We Go Again?

There are not a lot of details at this point, but it appears that yet another major US retailer has suffered a breach of its POS system. The online blog krebsonsecurity.com has reported that banks have tied credit and debit…

identity theft

Obama Acts to Promote Chip and PIN Card Security

Last Friday, President Obama signed an executive order requiring credit and debit cards issued to and on behalf of the Federal Government to conform to the EMV standards currently used in Europe. The standards add so called Chip and PIN…

Page 20 of 58« First...10...1819202122...304050...Last »