Search Results:
16-30 of 771 results

Can Cisco’s wireless home gateways be hacked into?

Vulnerability is said to be present in nine of Cisco’s wireless home gateways.

Malware

Published 17 July 2014

Cisco patches up Apache Struts 2 exploit

However, there is no update for Cisco Business Edition 3000.

Malware

Published 14 July 2014

Boeing hacked by Chinese businessman

Stolen data included information about C-17 cargo aircraft.

Malware

Published 14 July 2014

How Cisco’s unified communications system is at risk from hackers

The vulnerability is said to be present in all versions of Cisco’s Unified CDM.

Malware

Published 03 July 2014

Western energy sector facing cyber-sabotage threat

Deployment of sabotage capabilities by hackers could harm or disrupt energy supplies in affected nations.

Malware

Published 01 July 2014

NASA’s Curiosity carries two-decade old software bug to Mars

Software vulnerability could trigger buffer overflows.

Malware

Published 30 June 2014

UK technology industry at high risk from malware

About 59% of the UK malware attacks and 48% of botnet activity are targeted at the tech sector.

Malware

Published 30 June 2014

Banking malware 'Luuuk' stole €500,000 within a week

The malware also gathered the users’ logins and passwords and one-time passcodes.

Malware

Published 26 June 2014

Cisco developing open-source block ciphers

The firm is looking to protect traffic privacy in cloud systems.

Malware

Published 23 June 2014

House of Representatives vote to close NSA surveillance loophole

If passed, NSA will require a warrant for data searches.

Malware

Published 20 June 2014

Security breaches take hours to detect, weeks to neutralize: Report

Network automation may enable faster responses, it says.

Malware

Published 16 June 2014

Employees targeted with Bitcoin ransom phishing attack

PhishMe uncovers evidence of malicious malware stored in Dropbox

Malware

Published 09 June 2014

Office, Internet Explorer and Windows set for critical updates

Patch Tuesday: How could you be affected by the latest bulletins?

Malware

Published 06 June 2014

Microsoft invites adware companies to become approved vendors

The tech giant extends olive branch to adware companies to tackle pop-up ads.

Malware

Published 05 June 2014

New Soraya malware combines best of Zeus and Dexter to target card data

Soraya packs a punch with form-grabbing and memory scraping functionalities.

Malware

Published 04 June 2014

16-30 of 771 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.