Search Results:
76-90 of 658 results

Chinese hackers 'eavesdropped' on EU ministers ahead of G20 meeting

Hackers gained access to computer networks by sending emails with infected files to staff.

Malware

Published 10 December 2013

NSA planted spies inside 'World of Warcraft'

Further Snowden leaks reveal terrorist hunting in MMORPGs.

Malware

Published 09 December 2013

Jobseeker’s webpage hit with spam CVs by tech protesters

The government's Universal Jobmatch site has a browser plugin that automatically sends CV to several advertisers.

Malware

Published 09 December 2013

Dexter POS malware infections on the rise

Security researchers detected three separate variants of the Dexter malware, called Stardust, Millenium, and Revelation.

Malware

Published 09 December 2013

FireEye launches Oculus for SMBs

The Oculus platform for small and midsize businesses can help safeguard companies and their assets from web, email and mobile threats.

Malware

Published 09 December 2013

Microsoft disrupts ZeroAccess botnet

FBI and EC3 also involved in operation to hinder one of the world's largest botnets.

Malware

Published 09 December 2013

91% of organisations hit with cyber-attack at least once in past year

Firms have been increasingly falling victim to attacks from cyber hackers.

Malware

Published 06 December 2013

JP Morgan warns personal data loss after cyber attack into network

About 465,000 accounts may have been accessed.

Malware

Published 06 December 2013

Java, Adobe Reader and Flash 'most exploited Windows programmes'

Their vulnerabilities would allow Trojans and other malware types to attack PCs.

Malware

Published 05 December 2013

Irish businesses ‘review cyber security procedures after high-profile breaches’

Tarnished reputations are one of firms’ biggest fears from a cyber attack, finds survey.

Malware

Published 05 December 2013

Two million Facebook and Yahoo passwords appear online

Data was taken from computers infected with malicious software.

Malware

Published 05 December 2013

Drones vulnerable to hacking

Security expert builds e-war drone that hijacks other drones.

Malware

Published 05 December 2013

Researchers develop new malware that 'secretly leaks data' through air

High-frequency broadcast inaudible to human beings.

Malware

Published 04 December 2013

Android Jellybean flaw lets apps disable security mechanism

The vulnerability basically allows any fake app to disable all device locks.

Malware

Published 03 December 2013

Expert reaction: Cyber Monday's bank glitches

As RBS and NatWest come under fire, how can they prevent future failures?

Malware

Published 03 December 2013

76-90 of 658 results

Join our network

716 people like this.
1535 people follow this.

CBR Supplier Recommendations

  • Qualys - IT security risk and compliance solutions

    Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable organisations of all sizes to easily and cost-effectively ensure that their business technology systems remain highly secure and within regulatory compliance....

See more

CBR White Paper Recommendations

  • Making Your Website Safe for Online Buyers with the Qualys SECURE Seal

    22 February 2011 | By Qualys

    The number one concern of internet users is that a website will keep personal information safe and secure. Toward this end, many users look for a website to display a third party seal as evidence of security....

    White Papers
  • Web Application Security for Dummies®

    22 February 2011 | By Qualys

    Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures....

    White Papers
  • IT Policy Compliance For Dummies

    03 November 2010 | By Qualys

    This eBook explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfil those requirements. ...

    White Papers
  • Justifying IT Security - Managing Risk and Keeping Your Network Secure

    03 November 2010 | By Qualys

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of risk and how vulnerability management is one of the few counter-measures easily justified by its ability to optimise risk. ...

    White Papers
  • PCI Compliance for Dummies

    03 November 2010 | By Qualys

    Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This guide explains how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.