Posts Tagged ‘hacker’

Does hacker insurance make your business a bigger liability?

by Davey Winder It’s a scenario that every small online business fears: site security is compromised, hackers steal customer data including credit-card details, and your brand and your reputation are left in ruins. No wonder then, that many small online businesses are looking to insure against hackers and the resulting financial impact of a security […]

Leave a Comment

Automated polls not hack-proof

Image by Valerie ReneĂ© via Flickr By Andreo Calonzo The system that will be used in the May 2010 automated elections is not hack-proof, but adequate safeguards are in place to protect the results from hackers, the Commission on Elections (Comelec) assured Wednesday. “I am not saying that the system cannot be hacked. No system […]

Comments (6)

Hackers’ attacks rise in volume, sophistication

Year in review for online security attacks – 2009 is going to be known as a year of change in tactics of exploitation, rather than creating more new tools in hacker’s community. They are utilizing social media as a tool to exploit and using built-in trust in social media to their advantage. That’s why stealing […]

Leave a Comment

Five ways to lose your identity

By Jaikumar Vijayan The rush by shoppers to the Web makes the season a great time for online retailers. It’s also a great time for hackers looking to steal data and money from the unwary millions expected to search for great deals online. Checkout huge savings on Today’s Hot Deals on Information Security Solutions for […]

Comments (1)

Hackers steal credit-card numbers from restaurant customers

Here we have another unnecessary credit card data breach in a small organization which resulted in a loss of customers data demonstrating poor baseline security of small organization in this case a restaurant. Small organizations are not ready for PCI Compliance. Checkout why PCI Compliance is essential and why small merchants have to comply. Review […]

Comments (21)

‘China using elite hacker community to build cyber warfare capability’

Image via Wikipedia Hacking: The Art of Exploitation London, Oct 23 (ANI): The Communist regime in China with the help of a elite hacker community is building its cyber warfare capabilities and appears to be using a long-term computer attack campaign to collect US intelligence. An independent study released by a congressional advisory panel found […]

Leave a Comment

SmartPhone and Security

Mobile spyware is malicious software which is used to spy and control mobile devices (BlackBerry, PDAs, Windows Mobile and Cell Phones). Mobile spyware will not only intercept the message between two devices but also determine the location of the device. Basically, mobile spyware software is installed on a mobile device to spy on them. Small […]

Comments (1)