Patches

‘Distributed guessing’ attack lets hackers verify Visa card details

Armed with a card number, researchers tricked websites into helping them guess the expiry date and CVV.

Patch expert calls on Microsoft execs to fix Windows updating

IT admins surveyed by Susan Bradley, who moderates the PatchManagement.org mailing list, said Microsoft's current strategy is failing. So she took their concerns to Microsoft leaders, including CEO Satya Nadella, and asked them to make changes.

Partner Content
POS security vulnerabilities for retail industry

One of the most publicized POS breaches happened with American retailer, Target in 2013 where 41 million customer payment card accounts and contact information for more than 60 million Target customers were affected.

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?

The chase between cyber-crime and cyber-security: What are startups doing about it?

The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.

Lack of router security makes Indians vulnerable to cyberattacks: Report

Indian consumers who practice poor router security are at high risk from cyberattacks designed to take over their connected devices, steal passwords and gather other sensitive personal information

Seqrite detects high-risk Trojan that targets businesses

The multipurpose ransom-miner was detected by Seqrite experts when they observed a series of evolved malware blocked by the brand’s state-of-the-art security solutions at the customers’ end.

What can organisations learn from hackers? Inside Nuix's Black Report

Despite all the noise from security vendors, most hackers and pentesters can worm into a network and exfiltrate valuable data in under a day, including for critical systems, according to a recent report from Nuix.

Victims of malicious crypto miners increases by 44 percent: Study

Statistics for the last 24 months show that miners are increasingly focused on developing markets and are taking advantage of internet users in these regions to grow their revenues.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Best computer security tips

Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.

Satish K Sharma

Satish K Sharma led a team of experts to carry out a detailed gap analysis against ISO-27001:2013 guidelines to attain high security levels.