PCI DSS requires that network segmentation controls are penetration tested and that the methods used are operational
Application Penetration Testing for PCI
When considering application penetration testing for PCI, any software written by your organisation or written specifically for it,
PCI Penetration Testing – How to Define The Scope
Cardholder Data Environment
The PCI DSS defines the cardholder data environment (CDE) as follows:
PCI Penetration Testing Vs Vulnerability Scanning
If you take credit card payments, you may be aware that regular vulnerability scanning and penetration testing are
New Check Point Software Offers 100% Malware-Free Emails
Malware hidden within emails can be a severe security risk to many businesses with figures suggesting that
Over-reliance on Anti-Virus Software May Cost You
Nowadays, antivirus software is a standard part of any IT security arsenal, allowing the user to scan both static
Ghost leaves Linux systems vulnerable to possession
A vulnerability recently found by Qualys, in most Linux distributions could allow attackers to take remote
Prime Minister hints at ban on end-to-end encryption
Following he attacks in Paris on Charlie Hebdo, David Cameron
12 million homes and business routers vulnerable to remote attack
It may be Christmas time for most of us, and we may get a chance
Google blacklists 11,000 WordPress sites infected with Soak malware
The users of WordPress, a free and open source content
Kaspersky Lab discovers new Turla malware sample designed to target Linux operating systems
Researchers at Kaspersky Lab have uncovered a new malware
New study shows nearly half of all web application cyber-attack campaigns target the retail sector
A new study by Data Centre Security firm, Imperva, has shown nearly half of all web application cyber-attack campaigns target retail applications. The Imperva report, which was based on an analysis of 99 applications over a nine month period by the company’s Application Defence Centre (ADC) research team, found that the retail was the most …
Regin malware – one of the most extraordinary pieces of hacking software ever developed.
Rarely does a week go by without news of another high-profile cyber-attack or the discovery of another malware virus, yet despite numerous security warnings many businesses still purposefully choose to ignore the threats. For reasons that remain unclear they continue to believe that the internet is still a safe place to do business. Well, after …
New CPMI report claims that restoring payment systems after disruptive cyber-attacks could involve compromising analysis of incidents
In the event of a cyber-attack what should be a business’ main priority? Should the enterprise prioritise restoring services or should it concentrate its efforts on reporting the cyber-breach? Well, that’s the dilemma faced by many businesses in the financial markets. But which priority should businesses concentrate their resources on? Well, according to a Committee …
Targeted cyber-attacks will continue to rise in 2015
2014 will be remembered as a year where the cyber-threat landscape changed. Gone were the days when hackers launched random attacks against businesses in the vague hope that they might strike lucky. Instead they turned their attentions to targeted cyber-attacks against prominent retailers where the pickings were potentially rich. Successful mega-breaches/ intrusions against retailers like …