Three vulnerabilities could allow remote code injection, perform DNS hijacking or expose configuration information.
Rights Groups Call For New UN Privacy Watchdog
Desperate need for analysis, research and clarification of best practice
Simple PwnPOS RAM Scraper Stays Hidden for Two Years
Trend Micro spots yet another PoS malware variant breaching card data across the globe
Cyber Security Gaps Appear All Over Europe
BSA study shows best practice implementation is patchy at best
ENISA Hopes to Spur Government Cloud Adoption With New Guide
Cloud Security Alliace and Darmstadt university contribute to best practice framework
Firewalls Remain Strategic Security Investments
An overwhelming 92% of respondents indicate that firewalls will stand as a “critical” component of their security infrastructures over the next five years.
D-Link Routers Face Multiple Vulnerabilities
An exploit could give an attacker root access, allow DNS hijacking and more.
Major Chip Kit Maker ASML Hit by Cyber Attack
Local media blames China but photolithography specialist plays down incursion
#MWC15: Complexity of IoT may slow adoption, warns AVG
Complexity is the major challenge that stands in the way of wide-scale adoption of internet of things devices in the home, Yuval Ben-Itzhak, CTO at AVG Technologies, told Infosecurity at Mobile World Congress 2015.
#MWC15: Personal Privacy Has Become an Enterprise Issue, says Silent Circle
Silent Circle has unveiled a new ‘enterprise privacy ecosystem’ that it describes as the “world’s first.”