Security

Last Updated on 10 Oct. 2014, Total: 45 Blog Posts

  1. Data Breaches in Europe

    Reported Breaches of Compromised Personal Records in Europe, 2005‐2014... Read More

  2. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  3. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  4. What is PoS malware?

    PoS terminals are among the most vulnerable spots in retailers’ infrastructure for a number of technical reasons... Read More

  5. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  6. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  7. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  8. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  9. UK Cyber Security Challenge

    Cyber Security contains a diverse collection of disciplines across a broad spectrum of skills... Read More

  10. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

Featured Links