Select Page

New Twitter Worm Redirects Users to Rogue AV

Mumbai 2011::Kaspersky Lab, a leading developer of secure content and threat management solutions,warns users about a new, fast-moving Twitter worm which exploits Google’s goo.gl service of truncated links. The truncated URLs are lightweight and popularly used...

More security needed for ATMs

RIYADH: Concerns have been raised over the security of automated teller machines (ATMs) after a group of men managed to withdraw large amounts of money from them in Taif. Police in Taif arrested three young Saudis, all in their 20s, more than two months ago in...

Who should be PCI Compliant

It is often asked if this organization should be PCI Compliant. Many conferences include a discussion around the topic of Who should be PCI compliant. PCI DSS is applicable to all organizations who store, process or transmit account data. Extract from the PCI Standard...

Building an Information Security Plan

Building a comprehensive Information Security plan requires a detailed understanding of the business and the related requirements. An Information Security plan should ensure that the business requirements are captured and the related risks and controls are addressed...