Patches

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS exposures and all have a High Impact security rating and should be evaluated by users as soon as possible.

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

Partner Content
Top 5 IT tips for remote and mobile teams

In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the United States. 

Don’t let data security be your Achilles heel in transformation

The ruthless rampage of Cyberattacks is a worrying trend that threatens organizations of all scale. However, it should not slow down the adoption of latest technology offerings. Instead, devise strategies to ensure that security is met along your transformation journey.

How CIOs should respond to a data breach

How prepared is your organisation to deal with the fallout from a cyber attack?

Patch expert calls on Microsoft execs to fix Windows updating

IT admins surveyed by Susan Bradley, who moderates the PatchManagement.org mailing list, said Microsoft's current strategy is failing. So she took their concerns to Microsoft leaders, including CEO Satya Nadella, and asked them to make changes.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?

The chase between cyber-crime and cyber-security: What are startups doing about it?

The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.

Lack of router security makes Indians vulnerable to cyberattacks: Report

Indian consumers who practice poor router security are at high risk from cyberattacks designed to take over their connected devices, steal passwords and gather other sensitive personal information

Seqrite detects high-risk Trojan that targets businesses

The multipurpose ransom-miner was detected by Seqrite experts when they observed a series of evolved malware blocked by the brand’s state-of-the-art security solutions at the customers’ end.