Editorial

How to fend off PoS malware in 2016
Editorial How to fend off PoS malware in 2016

One of early 2016’s cyber-security incidents consisted in the Hyatt hotel chain disclosure that almost half of its global payment processing systems endpoints have been infested with PoS malware, active for 6 months during 2015. A Kasperky Lab blog pointed out, the situation is not singular and

Are you convinced you deleted that cloud file?
Editorial Are you convinced you deleted that cloud file?

Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a storage medium. This brings out the question of how hard it

Visual hacking – is this a hot privacy issue in the workplace?
Editorial Visual hacking – is this a hot privacy issue in the workplace?

Visual hacking, also dubbed shoulder surfing , is the act of accessing sensitive or relevant data by taking advantage of a physical position that allows the intruder to visualize another person’s device screen. Variations consist in determining the password from the most worn out keyboard key or

SCADA Systems security -just how important is it?
Editorial SCADA Systems security -just how important is it?

SCADA stands for Supervisory Control and Data Acquisition, being the consecrated denomination since the 70s for the remote monitoring and control activities necessary in modern industrial activities. A subcategory of the general ICS (Industrial Control Systems), SCADA systems gained importance with

Embedded risks – when vulnerable circuits threaten IoT
Editorial Embedded risks – when vulnerable circuits threaten IoT

In a pioneering move, cyber-security expert Bruce Schneier approached the risks linked to embedded systems as early as January 2014. Embedded systems cyber-security raised a certain amount of interest in 2015, and will represent an even hotter topic in 2016. Taking a broad view on what embedded

Malvertising:  what is it and how to browse safely
Editorial Malvertising: what is it and how to browse safely

Malvertising is the assigned term for malicious advertising , which represents the action of hijacking legitimate online advertising networks performed by malicious factors in order to inject their own malware-ridden advertisements into the said platforms. The usual shape malvertising takes is that

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later