UK enterprises fear EU Data Protection Act

UK enterprises fear EU Data Protection Act


UK enterprises fear EU Data Protection Act

Posted: 02 Apr 2012 10:47 AM PDT

The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its "EU General Data Protection Regulation - UK Enterprise Inquir...

Researchers link string of breaches to Chinese man

Posted: 02 Apr 2012 10:15 AM PDT

Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former Sichuan University student to...

Manage Linux and UNIX privileged access

Posted: 02 Apr 2012 10:00 AM PDT

BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, virtual and cloud environments ...

Potential first Android bootkit spotted

Posted: 02 Apr 2012 09:03 AM PDT

Security researchers of US-based NQ Mobile have recently discovered what might be the first Android bootkit. Dubbed DKFBootKit, the malware piggybacks malicious payloads into legitimate apps that requ...

1.5 million cards compromised in Global Payments breach

Posted: 02 Apr 2012 08:26 AM PDT

A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. "The company believes that the affected portion of its processing system is confined to...

Penetration testing tips, tricks and unusual situations

Posted: 02 Apr 2012 05:45 AM PDT

Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration testing courses, a regul...

Cloud computing trends that will affect cloud strategy

Posted: 02 Apr 2012 01:44 AM PDT

Continual monitoring of cloud computing trends, with regular updates to the enterprise's cloud strategy, will be essential to avoid costly mistakes or miss market opportunities over the next few years...

Deconstructing local and remote file inclusion attack vectors

Posted: 02 Apr 2012 01:35 AM PDT

Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and steal data through the ma...

Learning iOS Programming, 2nd Edition

Posted: 01 Apr 2012 10:01 PM PDT

Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you'll learn the steps necessary for developing your first marketable iOS application, from openin...

Week in review: Massive Zeus C&C servers seizure, Android security, and the challenges of being a CISO

Posted: 01 Apr 2012 09:01 PM PDT

Here's an overview of some of last week's most interesting news, reviews, podcasts, interviews and articles: Microsoft disrupts massive cybercrime operation In its most complex effort to disrupt...

0 comments:

Post a Comment