UK enterprises fear EU Data Protection Act |
- UK enterprises fear EU Data Protection Act
- Researchers link string of breaches to Chinese man
- Manage Linux and UNIX privileged access
- Potential first Android bootkit spotted
- 1.5 million cards compromised in Global Payments breach
- Penetration testing tips, tricks and unusual situations
- Cloud computing trends that will affect cloud strategy
- Deconstructing local and remote file inclusion attack vectors
- Learning iOS Programming, 2nd Edition
- Week in review: Massive Zeus C&C servers seizure, Android security, and the challenges of being a CISO
UK enterprises fear EU Data Protection Act Posted: 02 Apr 2012 10:47 AM PDT The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its "EU General Data Protection Regulation - UK Enterprise Inquir... |
Researchers link string of breaches to Chinese man Posted: 02 Apr 2012 10:15 AM PDT Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former Sichuan University student to... |
Manage Linux and UNIX privileged access Posted: 02 Apr 2012 10:00 AM PDT BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, virtual and cloud environments ... |
Potential first Android bootkit spotted Posted: 02 Apr 2012 09:03 AM PDT Security researchers of US-based NQ Mobile have recently discovered what might be the first Android bootkit. Dubbed DKFBootKit, the malware piggybacks malicious payloads into legitimate apps that requ... |
1.5 million cards compromised in Global Payments breach Posted: 02 Apr 2012 08:26 AM PDT A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. "The company believes that the affected portion of its processing system is confined to... |
Penetration testing tips, tricks and unusual situations Posted: 02 Apr 2012 05:45 AM PDT Raul Siles is a senior security analyst with more than 10 years of expertise performing advanced security services. He is a SANS Institute author and instructor of penetration testing courses, a regul... |
Cloud computing trends that will affect cloud strategy Posted: 02 Apr 2012 01:44 AM PDT Continual monitoring of cloud computing trends, with regular updates to the enterprise's cloud strategy, will be essential to avoid costly mistakes or miss market opportunities over the next few years... |
Deconstructing local and remote file inclusion attack vectors Posted: 02 Apr 2012 01:35 AM PDT Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and steal data through the ma... |
Learning iOS Programming, 2nd Edition Posted: 01 Apr 2012 10:01 PM PDT Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you'll learn the steps necessary for developing your first marketable iOS application, from openin... |
Posted: 01 Apr 2012 09:01 PM PDT Here's an overview of some of last week's most interesting news, reviews, podcasts, interviews and articles: Microsoft disrupts massive cybercrime operation In its most complex effort to disrupt... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment