Quantcast
Channel: security news – Cyber Parse – Cyber Security and Information Security
Browsing all 4495 articles
Browse latest View live

Perforce Open Sources Tools to Facilitate Customised Java Workflows

P4Java and P4Eclipse Are the Latest in 20+ Tools Available in Perforce's Open Source Workshop Key Points:Perforce has released the source code for its Eclipse plug-in (P4Eclipse) and Java API (P4Java)...

View Article


How Heartland Payments Is Securing Its Future

VIDEO: Bob Carr, CEO of Heartland Payments, discusses the lessons he learned from his company's major data breach and why he's optimistic about the future. Robert (Bob) Carr knows firsthand what it's...

View Article


MasterCard’s Plans for Facial Recognition Raise Questions

NEWS ANALYSIS: MasterCard's plans to add facial recognition as a means of verification might help secure online transactions, but at what cost and what risk? MasterCard is experimenting with facial...

View Article

Malicious PDFs Poison Google Search Results

A new SophosLabs report claims that malware-infected PDFs are influencing Google's search results. Getting a top ranking in Google's search engine is supposed to be an organic task, with the best...

View Article

Access Control Technology (ACT) Provides Enterprise-level Security Solutions...

Seoul, Korea and Birmingham, UK — 8 July, 2015 — Suprema, a leading global provider of biometrics and security technology, is pleased to announce that Suprema biometric devices can now be paired with...

View Article


Australian Practice Sparke Helmore Chooses Zylpha For Visualfiles Development...

Australian legal practice Sparke Helmore has chosen the DeveloperPlus solution from Zylpha (www.zylpha.com) to provide Development and Support cover for its existing Visualfiles case management...

View Article

How Enterprises Can Break the Cyber-Attack Lifecycle

Cyber-attacks on enterprises and governments are in the news nearly every week—sometimes every few days. As defenses have attempted to thwart the bad actors and their invasive tools, the origination...

View Article

Adobe Patches 36 Flaws, Including a Zero-Day, in Flash Player

If you use Adobe Flash (and you probably do), it's time to update (again).  Adobe came out today with the APSB15-16 security bulletin providing patches for 36 security vulnerabilities in Adobe Flash...

View Article


Google Must Offer U.S. Users ‘Right to Be Forgotten': Consumer Group

Consumer Watchdog filed a complaint with the FTC that Google's failure to offer a 'right-to-be-forgotten' option to Internet users in the U.S. is unfair. Consumer Watchdog, a long-time critic of...

View Article


Latest DoS Attacks Used Old Protocol for Amplification

Akamai finds that attackers have revived RIPv1, a decades-old protocol, to amplify their DoS attacks against targets. Attackers are using a three-decades-old Internet protocol for passing network...

View Article

Technology the Focus of NYSE, United Airlines Problems

Software and routers issues brought things at the exchange and airline to a halt for hours, raising concerns about computer resiliency and safety. The four-hour stoppage of trading on the New York...

View Article

RiskIQ highlights website security risks for UK’s top companies as end of...

With days to go before Microsoft Windows Server 2003 support ends, IIS 6.0 users are heading towards new security dangers.LONDON, UK, July 9, 2015 - Research from RiskIQ, the enterprise digital...

View Article

Adobe rushes out patch to fix Flash security flaws exploited by Hacking Team

Fixes for flaws exploited by government hacking products company Hacking Team

View Article


OpenSSL Patches for ‘Boring’ Certificate Risk

The open-source OpenSSL cryptographic library project came out today with a high-severity security advisory and patched a single vulnerability, identified as CVE-2015-1793. OpenSSL is a widely used...

View Article

Murky world of zero-day malware trading uncovered as leaks show Hacking Team...

$50k and up is the asking price for exploits, leaked emails reveal

View Article


Linux Foundation’s CII Now Assessing Open-Source Project Risk

The Linux Foundation's Core Infrastructure Initiative (CII) is creating a risk score for open-source projects to help identify those in need of funding and additional support. In the aftermath of the...

View Article

OPM Admits Breach Had Wider Reach: 25.7 Million American at Risk

After weeks of speculation, the U.S. Government Office of Personnel Management discloses the full impact of the breaches on its systems. After weeks of speculation that the data breach of the U.S...

View Article


How the Wild Neutron Hacker Group Avoids Detection

The hacker group known as Wild Neutron is still actively attacking companies around the world, a number of years after the group was first discovered in 2011. Both Kaspersky Lab and Symantec have...

View Article

Google Taps Neural Network Tech to Bolster Anti-Spam Efforts

The Gmail team is applying neural network technology that Google has used in other applications to detect spam while letting legitimate email go through. Google's Gmail team has improved how the email...

View Article

OPM Director Resigns After Breaches, but the Real Work Remains

NEWS ANALYSIS: Katherine Archuleta's resignation as the director of the Office of Personnel Management is a necessary step, but it doesn't solve the problem of inadequate security or inept management....

View Article
Browsing all 4495 articles
Browse latest View live