Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Research: 41 percent increasing IT security budget in 2014

Security concerns, budgets, trends and future plans were the focus of a recent Tech Pro Research survey, in which 41 percent of respondents said they will spend more on IT security in 2014 compared to...

View Article


Microsoft patches Windows, IE, Office and servers

Updates released today address a total of 37 vulnerabilities in Windows, Internet Explorer, Office, SharePoint Server 2013, the .NET Framework and SQL Server.

View Article


Microsoft Fixes Critical Vulnerabilities in Internet Explorer, Windows

Microsoft and Adobe released a set of patches today to fix critical vulnerabilities in their products.

View Article

Ana Veciana-Suarez: Hackers make life a pain in the password

About three months ago, when the Heartbleed encryption bug was discovered, I painstakingly sifted through all my online accounts – banking, social media, investments and emails – to change every single...

View Article

Chicago Yacht Club Point-of-Sale System Compromised

Following an investigation into a point-of-sale (PoS) system crash, Chicago Yacht Club found evidence consistent with malware installation on one of their servers. Further examination determined that...

View Article


Adobe Reader and Acrobat Zero-Day Vulnerability Patched in 11.0.08

A new, out-of-band update has been released for Adobe Reader and Acrobat, fixing a security flaw that offers an attacker the possibility to bypass sandbox protection.In a security bulletin issued on...

View Article

Seven Critical Flash Player Vulnerabilities Fixed in New Version

The latest revision of Adobe Flash Player adds no less than seven security patches to the software, all marked critical.Four of the glitches were reported by Chris Evans, from Googles Project Zero and...

View Article

Researcher Finds Potholes In Vehicle Traffic Control Systems

DEF CON 22 – Smart traffic sensor systems that help regulate and automate the flow of traffic and lights contain security weaknesses that could be manipulated by hackers and result in traffic jams or...

View Article


New Android Malware Krysanec Infects Legitimate Apps

A new remote access Trojan (RAT) for Android has been found to integrate malicious functionality in legitimate apps, allowing the attacker control over various functions of the device, such as camera,...

View Article


Bank Faces Lawsuit Over $327,000 in Losses from Cyber Attack

Hackers stole the funds from TEC Industrial in 55 separate ACH drafts on May 10, 2012.

View Article

Partnerships, Innovation Drive CyberPatriot Success

The report of the largest known harvest of Internet credentials, an estimated 1.2 billion passwords, names and personal information from 420,000 web sites by a group of Russian hackers, is but the...

View Article

Apple to store some user data in China: Weighing the pros and cons

Apple’s move to store some of its Chinese user’s data in the country has benefits — and drawbacks — for its customers.

View Article

2014 ICS Cyber Security Conference Agenda Update

Our team is busy putting together the bestICS Cyber Security Conferenceto date.

View Article


Local farmers market website hijacked by Russians

The East Nashville Farmers Market is an unlikely victim of Russian hackers that have hijacked its website.

View Article

Bypassing Security Defenses: DEF CON

In an attacker’s ideal world, he or she would infect a desktop, steal the user’s RDP password and move smoothly across the network to the RDP server and immediately gain access. In real life however,...

View Article


Albertson’s stores hacked for credit card data

Hackers have broken into the credit and debit card payment networks at two of the nation’s most popular supermarket store chains: Albertson’s and SuperValu. Incoming search terms for the article:...

View Article

Security Research and the Law: What You Need to Know

Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.

View Article


Robin Williams’ ‘Goodbye’ Video – Facebook Scam

A message circulating on Facebook claims to take users to a video recorded by Robin Williams to say goodbye before his untimely death; this is another cybercriminal attempt to exploit user curiosity to...

View Article

Heartbleed exposes weaknesses in hardware design

Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks, a university researcher said this week.

View Article

Russian hacking suspect ordered held until trial

Robert W. Ray, left, and Ely Goldin, right, attorneys for Roman Seleznev, speak with reporters outside the U.S. District Courthouse in Seattle on Friday, Aug. 15, 2014.

View Article
Browsing all 2490 articles
Browse latest View live