Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

The challenges of implementing tokenization in a medium-sized enterprise

We have seen a concerning pattern in the recent data breaches, including the breach at the Internal Revenue Services (IRS) and other US government agencies in that the primary target was Social...

View Article


Government asks bidders on hack contract: Can your company host and protect...

The government plans to award a sweeping five-year contract in August to a private company to monitor the hacked security clearance data of 21.5 million people for identity theft — and ensure that the...

View Article


Finally! A free, open source, on-premise virus scanner framework

After having spoken about it for quite a while, security researcher Robert Simmons has finally begun publishing the code and documentation of his open source AV scanner framework dubbed PlagueScanner....

View Article

The ABC of Information Security

When talking about the types of information security issues that companies have to deal with, there are so many areas to look at that, at times, it can seem difficult to know where to start. While...

View Article

The business payment security survival guide

A #business #payment #security survival #guide is a useful tool for small businesses. Anyone looking to start an #online store, or already established businesses trying to countercheck or improve their...

View Article


Are contactless payments safe?

“Your total is $12.95,”says the cashier at the local supermarket. I take out my wallet to perform a familiar tap on the POS terminal, wait a second, then hear the beep and – voila! – the transaction is...

View Article

National Guard to Establish Cyber Protection Team

Army General Frank J. Grass, National Guard Bureau Chief and member of the Joint Chiefs of Staff, announced plans to form the National Guard Cyber Protection Team, which will establish a cyber-defense...

View Article

A New Hope for Victims of Data Breaches

A federal court gave new hope this month to victims of data breaches. In the past, most class-action lawsuits filed by victims have been dismissed by courts due to lack of standing—although a victim’s...

View Article


Balance security and convenience with Windows 10’s Wi-Fi Sense

According to one report, as of the morning of July 31, 2015, two days after it was made available, Microsoft Windows 10 had been installed on over 67 million PCs. No matter how you slice it, that’s a...

View Article


Security Trends That Dominate 2015

The latest type of security exploits target connected cars and airplanes. Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since...

View Article

What is the core idea behind applying ISO 27001?

The dynamic environment of security risks is a place of constant change, where new threats develop, vulnerabilities are discovered, and security incidents arise with major repercussions, both for...

View Article

Black Hat USA 2015: The full story of how that Jeep was hacked

Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly...

View Article

Blackhat USA and Defcon 2015

Blackhat and Defcon 2015 are being held in Las Vegas this year in the Mandalay Bay and Paris hotels, with 9,000 people in Blackhat attendance and more at Defcon. While attending Blackhat is far more...

View Article


Mobile threat intelligence is a boon, but beware of information overload

As mobile devices increasingly become the target of security threats, some organizations are applying cyber security tools specifically for threat intelligence. This provides real-time data feeds about...

View Article

Air gapped computers – security issues

The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized...

View Article


Windows and UEFI anti-theft mechanism makes systems less secure

With the litany of free trial programs, adware, and other unwanted “features” that come with the factory images of Windows computers, it has become standard procedure for many users to wipe the system...

View Article

10 security technologies destined for the dustbin

Perhaps nothing, not even the weather, changes as fast as computer #technology. With that brisk pace of #progress comes a grave responsibility: securing it. Every wave of new tech, no matter how small...

View Article


Security and the Internet of Things – Are We Repeating History?

The Internet of Things (IoT) refers to the networking of endpoint products and objects that can be accessed via the Internet. The objective of this level of networking is to make our everyday...

View Article

Keyless Cars: A New Frontier For Bug Bounties?

Convenience always seems to come at a cost and never more so than with the keyless car. News emerged last week that car manufacturers using the Megamos Crypto transponder electronic vehicle...

View Article

Ouch! Feeling The Pain Of Cybersecurity In Healthcare

There’s no vaccination that can stem the outbreak of recent healthcare-related data breaches. If anyone needs a reminder about why medical records are increasingly a target, just thumb through all the...

View Article
Browsing all 2490 articles
Browse latest View live