Posts Tagged ‘Business’

Why you should care about your digital privacy?

Surveillance Countermeasures When we use internet browser for a web search, social media site, communication (skype), buy something from a site, we are leaving digital tracks all over the internet. Your service provider of the above services have access to this information because they are collecting  this treasure trove to identify and figure out what […]

Leave a Comment

Controls against Mobile Code

ISO 27002 control A 10.4.2 of the standard requires that mobile code execution should be restricted to an intended environment to support an authorized organization mobile code policy. What is a mobile code so let’s first start with the definition: ‘Program or a code that can execute on remote locations without any modification in the […]

Leave a Comment

New Tools for IT and Security professionals

IT Governance continually striving to create, source and deliver products that can help IT and Information Security professionals in the real world. Check out their latest on Business Continuity, ITIL & ITSM and Information Security products below to help you in your current and future projects. This is a perfect time of the year to start […]

Leave a Comment

How to protect ourselves from Payment Fraud

Some basic advice has been issued by Apacs, and includes: * Don’t let your cards or your card details out of your sight when making a transaction * Do not keep your passwords, login details or Pins written down * Do not disclose Pins, login details or passwords in response to unsolicited emails * Only […]

Comments (1)

Top Five Hollywood Hackers Movie

In movies the hacker tries to hack into a Department of Defense computer by speed-typing passwords. We all know reality is nothing like this and we see it as the joke that it is. But business management don’t see the inherent risks as affecting business bottom line but a hindrance to another new project; they […]

Comments (1)

The Basics of Stuxnet Worm and How it infects PLCs

Image by biatch0r via Flickr Considered to be the most intricately designed piece of malware ever, Stuxnet leverages attack vectors onto industrial control systems, a territory rarely ventured into by traditional malware. Stuxnet targets industries, power plants and other facilities that use automation and control equipment from the leading German industrial vendor, Siemens. The term, […]

Comments (1)

Protect your credit card information and avoid Fraud

Image by Getty Images via @daylife Essentials of Online payment Security and Fraud Prevention As we all know that credit card frauds are on the rise and crooks are utilizing more advanced techniques to acquire credit card information. In these circumstances anyone can lose their private and credit card information to crooks. Individual due diligence […]

Comments (1)

Stuxnet, world’s first “cyber superweapon,” attacks China

Image by toastiest via Flickr Stuxnet, the most sophisticated malware ever designed, could make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction; experts suspect it was designed by Israeli intelligence programmers to disrupt the operations of Iran’s nuclear facilities — especially that country’s centrifuge farms and the nuclear reactor […]

Comments (1)

Cloud Computing: A Treasure Trove for Hackers

Image by Ivan Walsh via Flickr Above the Clouds: Managing Risk in the World of Cloud Computing By Dick Weisinger Security usually tops the lists of concerns that people have about the cloud. And now it seems like there is good reason. On a recent survey of 100 “elite” hackers at the 2010 Defcon conferenece, […]

Comments (4)

Cyber attacks against Water, Oil and Gas Systems

Image via Wikipedia “This summer the Norwegian National Security Authority (NSM) discovered for the first time targeted computer attacks directed against internal process and control systems to ensure supply of electricity and water. Similar attacks were discovered in Germany and Belarus. EU’s cyber-security unit, ENISA, will in late October or early November carry out the […]

Leave a Comment

13 Things an Identity Thief Won’t Tell You

Image by CarbonNYC via Flickr Stopping Identity Theft: 10 Easy Steps to Security by Reader’s Digest Magazine, on Thu Aug 12, 2010 Interviews by Michelle Crouch Former identity thieves confess the tactics they use to scam you. 1. Watch your back. In line at the grocery store, I’ll hold my phone like I’m looking at […]

Comments (1)

FTC Says Scammers Stole Millions, Using Virtual Companies

Image via Wikipedia 100% Internet Credit Card Fraud Protected by Robert McMillan The U.S. Federal Trade Commission has disrupted a long-running online scam that allowed offshore fraudsters to steal millions of dollars from U.S. consumers — often by taking just pennies at a time. The scam, which had been run for about four years, according […]

Leave a Comment

Security glitch exposes WellPoint data again

Image via Wikipedia By Tom Murphy INDIANAPOLIS – WellPoint Inc. has notified 470,000 individual insurance customers that medical records, credit card numbers and other sensitive information may have been exposed in the latest security breach of the health insurer’s records. The Indianapolis company said the problem stemmed from an online program customers can use to […]

Leave a Comment

Symantec: SMBs Change Security Approach with Growing Threats

Image via CrunchBase By: Brian Prince A survey of small to midsize businesses from 28 different countries by Symantec found that companies are focusing more on information protection and backup and recovery. Driving these changes is a fear of losing data. Today’s small to midsize businesses (SMBs) are facing a growing threat from cyber-attacks, and […]

Leave a Comment

The Smart Grid needs to get smart about security

Image via Wikipedia by Larry Karisny While following the Connectivity Show in Santa Clara California, I thought I should follow-up on the at Greentech Media’s annual Smart Grid conference in Palm Springs last week. I wanted to focus this article on Smart Grid security so I thought I should find some clear explanation of where […]

Comments (1)