|
Chip & Pin launch has less to do with reducing fraud than reducing the Card Companies liability | Hits:16 |
Early Warning, the online scheme that helps UK retailers to prevent CNP (card-not-present) credit-card fraud, has today released figures showing a 30% increase (year on year) in the amount of CNP fraud data that has been gathered... | 07/08/2009 |
Versions 1.1 and below of the IN module in PunBB suffers from a remote blind SQL | Hits:22 |
#!/usr/bin/perl #[0-Day] PunBB Affiliations.php IN Mod = v1.1 Remote Blind SQL Injection Exploit #Coded By Dante90, WaRWolFz Crew #Bug Discovered By: Dante90 UltraSound, WaRWolFz Crew use strict; use LWP::UserAgent... | 07/07/2009 |
Japanese bank computer fraud robbery attempt should be no surprise | Hits:47 |
A high-tech gang used a keyboard logging Trojan horse to spy on desktop computers at Sumitomo, the Japanese banking group, capturing keypresses. This gang is said to have planned to steal 220m and transfer the money electronically to ten... | 07/07/2009 |
Instant Messaging Continues to Advance as an Attack Vector for Hackers to Gain Access to Organisatio | Hits:19 |
Websense Security Labs(tm) has reported a 300 percent increase of attacks that use instant messaging and malicious websites in the first quarter of 2005, versus the fourth quarter of 2004. IM can be a highly effective business tool for... | 07/07/2009 |
Virtualisation: Why existing security measures are no longer enough | Hits:5 |
Although virtualisation is not a new concept its present implementations are changing the face of corporate IT, through the reduction of the number of physical servers, the consolidation of rack space and the cutting of energy costs.... | 07/06/2009 |
Next Generation Authentication Technology Can be the Answer to Identity Theft and Online Fraud | Hits:6 |
Every day billions of dollars are being lost by financial institutions and corporate enterprises through a range of ingenious acts of Internet fraud. This global problem is now reaching epidemic proportions and is the major... | 07/06/2009 |
Open Source For Perimeter Security | Hits:14 |
There is a widespread and wholly inaccurate impression that open source development is somehow haphazard and undisciplined, a free-for-all among brilliant but uncoordinated individuals. In fact, most major open source projects are very... | 07/06/2009 |
Computer Associates acquires eTrust Cleanup | Hits:36 |
Computer Associates International, Inc has announced the acquisition of an advanced mainframe identity and access management solution that protects enterprise IT environments by automatically identifying and removing obsolete, unused and... | 07/01/2009 |
Top secret German Police hard drive sold over ebay for 20 euros | Hits:22 |
This week's Spiegel - one of Germany's leading weekly papers has revealed that a computer hard drive with confidential data from the Brandenburg police in Germany has been auctioned over eBay for a mere 20 Euros. The used hard drive with... | 07/01/2009 |
Identity Theft In The Corporate Network | Hits:10 |
The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. Whilst he s under the desk, it is a matter of seconds for him... | 06/30/2009 |
Sheffield man arrested in connection with dating website hack and Fathers 4 Justice worms | Hits:11 |
According to The Register, a 37-year-old man has been arrested by British police under suspicion of hacking into the online dating website, loveandfriends.com. Officers from New Scotland Yard's Computer Crime Unit are also said to have... | 06/30/2009 |
Pointsec to Secure Business Critical Data for Swiss Re | Hits:12 |
Pointsec has announced it will provide endpoint security technology for Swiss Re, one of the world's leading reinsurers and the world's largest life and health reinsurer. Swiss Re is one of the world's leading... | 06/26/2009 |
Finally Software Offers Protection from Keystroke Monitoring Spyware and Identity Theft | Hits:12 |
Finally Software has announced the immediate availability of Fin-Keylog, a software product designed to effectively protect sensitive keystroke data from being hacked from a PC. Fin-Keylog provides a real-time... | 06/26/2009 |
Is machine-to-machine the gap in your security? | Hits:9 |
Over the last ten years, major changes have occurred in IT. With the Internet driving the pace, one of the most significant developments has been the rise of IP to become the dominant protocol. Another key element has... | 06/24/2009 |
Toxic Blogs Distribute Malcode and Keyloggers | Hits:16 |
Blogs are increasingly being exploited as a means to distribute malicious code and keylogging software. Cyber-criminals are now taking advantage of blog sites that allow users to easily publish their own web pages at no cost. Blogs can... | 06/24/2009 |
|