Networks

Researchers Develop Personal Firewall Solution for Pacemakers, Insulin Pumps

Purdue University and Princeton University researchers have developed a device, called MedMon, which is designed to protect wireless medical devices such as pacemakers and insulin pumps from hacking...

Smart Meter Hacks Cost a Single Utility $400 Million a Year

According to KrebsOnSecurity's Brian Krebs, a 2010 FBI cyber intelligence bulletin reported that cyber attacks on smart meters have already cost a single electric utility in Puerto Rico, the Puerto ...

How to Secure Your Company’s Videoconferencing System

Over the past six years, high-definition videoconferencing systems have become increasingly ubiquitous in corporate boardrooms and meeting rooms.  The benefits of videoconferencing – productivity ga...

Social Engineering Attack Nets $2.1 Million from Wells Fargo Bank

An unidentified scammer managed to convince Well Fargo Bank to transfer $2.1 million to him from Catholic Healthcare West's bank account."The brazen theft was pulled off ingeniously, but the bigges...

Symantec Launches Single Sign-On for the Cloud

Symantec (NASDAQ: SYMC) is rolling out a new platform called O3 Cloud Identity and Access Control to help enterprises better control their employees' access to the cloud. With a general availability...

Poor Management of Security Certificates Identified as Key Business Risk

SSL certificates are cornerstone security elements for many enterprises. Yet new research shows that few organizations have deployed effective processes for securely managing those certificates.A st...

Major Security Breach at Popular Porn Site

Hackers recently published user account information from adult Web site YouPorn."According to security blogger Anders Nilsson, the email addresses, passwords and birthdates of over one million users...

How to Secure Your Facebook Business Page

Do you manage a Facebook Page for your business or organization? If so, you're probably aware that many of the same security issues that plague personal profiles also apply ...

Glass Box: The Next Phase of Web Application Security Testing?

For years, security researchers have used the terms "black box" and "white box" to describe dynamic and static web application security analysis, respectively. IBM is now seeking to combine the best...

Protecting Against SQL Injection Attacks with Oracle Database Firewall

Exploits that take advantage of SQL Injection (SQLi) vulnerabilities in software are among the most dangerous and prevalent attacks on the Internet today.In a SQLi attack, hackers typically take adv...

Latest articles