Search Results:
31-45 of 772 results

New Soraya malware combines best of Zeus and Dexter to target card data

Soraya packs a punch with form-grabbing and memory scraping functionalities.

Malware

Published 04 June 2014

"Hybrid" Zberp Trojan combines features from two existing threats

New Trojan targets users at as many as 450 banks across the world.

Malware

Published 27 May 2014

Half of Brits no longer trust eBay

New survey shows the impact of eBay’s data breach on consumer attitude.

Malware

Published 23 May 2014

How the eBay data breach could affect 99% of companies

Skyhigh Networks’ data shows the average Fortune 2000 Company has 15,800 employees who use eBay.

Malware

Published 22 May 2014

Microsoft fails to patch latest Internet Explorer 8 zero-day exploit

HP’s Zero Day Initiative publishes IE8 flaw details without fix available.

Malware

Published 22 May 2014

Top 6 commercial data breaches

With eBay becoming the latest target, what other cyberattacks shook the consumer world recently?

Malware

Published 22 May 2014

eBay cyberattack: What should I do?

Over 220m customer accounts have been compromised in one of the largest ever cyberattacks.

Malware

Published 22 May 2014

China calls out 'hypocritical' US on hacker charges

Chinese Foreign Ministry has summoned US Ambassador to descalate tension.

Malware

Published 21 May 2014

BlackShades "cheap" malware allowed criminals hijack half a million computers

Crackdown in Europe, US results in 97 arrests

Malware

Published 20 May 2014

What is PLA Unit 61398 and who are the five Chinese hackers?

US indicts Chinese military cyber troops alleged to have stole industrial information.

Malware

Published 20 May 2014

How GCHQ exploited Facebook security weaknesses

UK spies used Akamai content delivery network to extract user data.

Malware

Published 14 May 2014

Russia may be following in the footsteps of China's Great Firewall

Putin wants a sovereign internet and and access to all data passing through Russian servers.

Malware

Published 12 May 2014

Surveillance reform bill targeting NSA spying clears hurdle

House Committee clears bill aimed at curbing government surveillance.

The Boardroom

Published 08 May 2014

“Reset the Net” to fight NSA spies, says rights group

Calls for web users to set up “NSA-resistant” privacy tools by June 5.

Security

Published 07 May 2014

MI5: Your junior IT employees are being groomed to steal information

Cold War era cyber-games putting UK firms at risk.

Malware

Published 06 May 2014

31-45 of 772 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.