Cisco: Hackers from Syrian Electronic Army use third party services for attacking mass-media

According to experts, those portals whose content is generated by third parties, journalists are at greater risk of being compromised. As the recent report by researchers from Cisco, a group of hackers calling themselves the Syrian Electronic Army, most likely use services of third parties to carry out attacks on the websites of various media.(…)

Festive boom of Internet shopping underlines weaknesses of web applications

According to the company HP, a record number of visitors to online stores in 2011, means that developers and administrators need to change the way to do application development, deployment and management. Much of the increase in traffic comes from mobile devices, increasing the burden on both servers and the applications. Companies will need to(…)

Gartner: major trends of information security and secure shopping for 2012

Data Security Standard Payment Card Industry (PCI) – burning issue, but a recent study by Gartner found that 18% of respondents admitted that they are not PCI-compliant, although the study was implied that they had to comply with these standards. Gartner conducted several studies in the period from June to September this year at the(…)

How to remove Carrier IQ from Android, Blackberry and iPhone

It is still not 100% cleared up the situation with who and for what purposes the use of Carrier IQ smartphone users, but all holders of platforms iOS, Android, and now the Blackberry can be manually removed from the mobile’s built-in friend a tracking system. Harvesting Carrier IQ with iPhone: According to Apple, the majority of smartphones on(…)

Old smartphones: tons of data to new owners

A recent study of used smartphones, conducted by a company engaged in digital examination, showed how easily retrieve information from old or lost devices even if they were thrown to the factory settings.An expert from the AccessData has shared the results of his study and told about the consequences for corporations and consumers who are(…)

Young users are going to extreme measures for access to Internet

According to study of the worldwide Cisco, 7 out of 10 young workers often ignore the politics of IT, and one of four becomes a victim of identity theft and 30 years. The study found a striking relationship to the IT policy and the growing threats to security that represents a new generation of workers(…)

10 most important Open Source projects in 2011

That came to an end for another year. It’s time to step back and evaluate everything that has happened during this period. It turns out that in 2011 became a model in terms of support for open source projects. So select 10 projects have been quite difficult. But what is meant by the word “important”? Obviously, this is not(…)

A new generation of targeted attacks

With the arrival of young professionals in the company’s experts predict changes in the Cisco security and data protection. In its annual report on the safety of the company have identified trends that suggest that college students who plan to work in large companies do not take security as seriously as their predecessors. The researchers(…)

SCADA endangers critical infrastructure

According to warnings of U.S. agencies that protect national critical infrastructure, electronic devices used to control the equipment at water treatment plants and other industrial sites contain serious flaws that could allow attackers to remotely manage them. “Some models of the PLC Modicon Quantum, used in industrial control systems contain several hidden accounts that use(…)

Google Wallet stores certain information on payment cards in unencrypted format

“Significant” amount of unencrypted data sets with Android phones in a risky position, the researchers say. The most awaited mobile payment application from Google for the calculations in the local shops keep certain sensitive information about users in plain text, such as user names, dates of transactions, e-mail addresses, as well as balance in the(…)