Firewall audits receive a lot of attention nowadays due to standards such as PCI-DSS, ISO 27001 and SOX and HIPAA
Social Engineering Testing and PCI
The term social engineering refers to the practice of attempting to compromise a system through the manipulation of those who
PCI Segmentation Checks – What’s Required
PCI DSS requires that network segmentation controls are penetration tested and that the methods used are operational
Application Penetration Testing for PCI
When considering application penetration testing for PCI, any software written by your organisation or written specifically for it,
PCI Penetration Testing – How to Define The Scope
Cardholder Data Environment
The PCI DSS defines the cardholder data environment (CDE) as follows:
PCI Penetration Testing Vs Vulnerability Scanning
If you take credit card payments, you may be aware that regular vulnerability scanning and penetration testing are
New Check Point Software Offers 100% Malware-Free Emails
Malware hidden within emails can be a severe security risk to many businesses with figures suggesting that
Over-reliance on Anti-Virus Software May Cost You
Nowadays, antivirus software is a standard part of any IT security arsenal, allowing the user to scan both static
Ghost leaves Linux systems vulnerable to possession
A vulnerability recently found by Qualys, in most Linux distributions could allow attackers to take remote
Prime Minister hints at ban on end-to-end encryption
Following he attacks in Paris on Charlie Hebdo, David Cameron
12 million homes and business routers vulnerable to remote attack
It may be Christmas time for most of us, and we may get a chance
Google blacklists 11,000 WordPress sites infected with Soak malware
The users of WordPress, a free and open source content
Kaspersky Lab discovers new Turla malware sample designed to target Linux operating systems
Researchers at Kaspersky Lab have uncovered a new malware
New study shows nearly half of all web application cyber-attack campaigns target the retail sector
A new study by Data Centre Security firm, Imperva, has shown nearly half of all web application cyber-attack campaigns target retail applications. The Imperva report, which was based on an analysis of 99 applications over a nine month period by the company’s Application Defence Centre (ADC) research team, found that the retail was the most …
Regin malware – one of the most extraordinary pieces of hacking software ever developed.
Rarely does a week go by without news of another high-profile cyber-attack or the discovery of another malware virus, yet despite numerous security warnings many businesses still purposefully choose to ignore the threats. For reasons that remain unclear they continue to believe that the internet is still a safe place to do business. Well, after …