breach - News, Features, and Slideshows
- Exposing the Cybersecurity Cracks - Hurdles to Getting Security Right
- Catch of the Day Breach takes three years to report
- The week in security: Password managers, IT managers under fire over security disconnect
- Hacked - The perfect attack
Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.
Catch of the Day claims to be Australia's number one online department store. And a look at their prices and range makes it clear that they have a reasonable claim on that crown.
The Ponemon Institute released the second part of their "Exposing the Cybersecurity Cracks: Australia" report earlier this week. Sponsored by Websense, the report focussed on three key areas: Roadblocks, Refresh and Raising the Human Security IQ.
Investment bank Goldman Sachs is scrambling to retrieve a sensitive email that an IT contractor accidentally sent to an unintended Gmail account -- and it’s suing Google to get the job done.
Think of the perfect attack like the perfect murder. It must be planned carefully and meticulously then executed systematically and flawlessly. Remember all the small detail in Hitchcock’s “The Rear Window”? No-one would have noticed anything or even missed the victim if it weren’t for Jimmy Stewart, who, with a broken leg had nothing better to do all day than to gaze out his rear window.
Whitepapers about breach
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
Sign up now »
Kaspersky Open Space Security provides complete business protection in a single integrated suite of applications that work seamlessly across all platforms.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.