People and organizations dispose of their computers including the Hard drives when no more needed or considering that they are obsolete. The media such as hard drives, USB etc when…
The cardholder data breach is not a new thing. It is been a nightmare for every CIO in the world. Dancho Danchev's blog has an interesting article on how these…
It is been considered that the cloud computing solutions reduces the cost of computing resources as far as organization is concerned. However, a recent white paper from ISACA indicates that…
In the recent past, Middle Eastern companies are becoming a frequent target of attackers. Malware attack at the Saudi Aramco oil company is the latest in these series. News sources…
The recent power outage in the northern parts of India was part of a grid failure. However, it could have been a result of security failure as well. The security…
The number of organizations adopting clouding computing increases day by day. The COSO has published a thought paper on Enterprise Risk Management for Cloud Computing. In this paper, it provide…
Backtrack developers had released a new version of the backtrack penetration testing live CD / VMware version yesterday. This version adds a number of tools in addition to the bugfixes,…
NIST has published the final version of their guide on Computer Security Incident Handling. This guide is built based on the best practices adopted by governments, other non-commercial organizations and…
Kaspersky Labs announced its new finding on the cyber warfare space, FLAME, indicating that the cyberwar landscape is taking new dimensions. The new malware named Flame is located in the…
Checkpoint is getting into the Free Antivirus game by offering its ZoneAlarm antivirus software as a free consumer product for the first time, adding the company's no-cost firewall to the…