Here's a new way to get Microsoft to pay attention to you: Slip a brief message into the malicious Trojan horse program you just wrote. That's what an unnamed Russian hacker did recently with a variation of Win32/Zlob, a Trojan program victims are being tricked into installing on their computers.
Read More
Hacker Leaves Message for Microsoft in Trojan Code | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5805 days ago
RFID: Future of Convenience Shopping? | rfidied.com
Posted by himangim under TechnologyFrom http://www.rfidied.com 5805 days ago
Shopping for essentials can be tiresome for many. First you need to move around such a vast place searching for your stuff and then standing in long queues to pay the bills. Wouldn't you want your shopping to be a hassle free experience where you enter into the supermarket, pick up things you need and walk out without having to stand in queues fo
Read More
Retailer Safety Net for PCI Compliance | cocompliance.com
Posted by rupalik under TechnologyFrom http://www.cocompliance.com 5806 days ago
Information security company SafeNet has developed a data protection encryption and key management security service for retailers still struggling to comply with the Payment Card Industry's Data Security Standard.
Read More
Google Code Abused by Hackers | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5806 days ago
McAfee warns that lots of fake Google Code projects have been created by cyber-criminals in order to push malware to unsuspecting users. The projects promote adult videos that prompt users to download malware in the form of fake video codecs.
Read More
Virtualization Will Help With Acquisitions In 2009 | timesofvirtualization.com
Posted by himangim under TechnologyFrom http://www.timesofvirtualization.com 5806 days ago
I expect that the current recession will last through all of 2009 and will accelerate the adoption of virtualization technology. Up until now, virtualization--especially x86 server virtualization--has been pushed forward by the huge hardware and operational savings accrued from app server consolidation. Sadly, the consolidation of whole businesses
Read More
5 Steps to Better Data Security | timesofitsecurity.com
Posted by rupalik under TechnologyFrom http://www.timesofitsecurity.com 5807 days ago
Everyone knows there is no silver bullet for security. And like all organizations, government agencies have to contend with increasingly complex, potentially damaging and a surprisingly sophisticated new class of security threats. Learn what five steps you can take now to feel confident that you are being proactive and preparing your organization
Read More
5th Annual Compliance Awards, UK | cocompliance.com
Posted by rupalik under TechnologyFrom http://www.cocompliance.com 5807 days ago
Complinet's 5th Compliance Awards ceremony will take place at Park Lane's prestigious Grosvenor House, January 22, 2009.
Read More
Should Midmarket Companies Have One Virtualization Environment? | timesofvirtualization.com
Posted by himangim under TechnologyFrom http://www.timesofvirtualization.com 5807 days ago
A lot of budget-strapped CIOs are going to be telling their systems and storage directors to take another look at consolidation this year. These days, consolidation means virtualization. Only recently, that mainly meant VMware ESX. That is still the weapon of choice for many reasons, but suddenly Microsoft actually has a competitive product. After
Read More
History of RFID - For All Those Who Wanted To Know Its Past | rfidied.com
Posted by himangim under TechnologyFrom http://www.rfidied.com 5807 days ago
Amy Johnston knows how to bring art and technology together. Her concept of Hidden Agenda makes sure that fashion never remains away from technology. For this purpose she used forty five pieces of black RFID tags and sterling silver to create an eye catching open mesh collar.
Read More
The Risk of ePassports and RFID | rfidied.com
Posted by himangim under TechnologyFrom http://www.rfidied.com 5810 days ago
Today vonJeek/THC released his tool and a video how to duplicate (clone) and modify a Passport with RFID chip. http://freeworld.thc.org/thc-epassport/ The weakness is in the way the system has been rolled out. The terminal accepts self-signed data. This attack is different to the grunwald attack. VonJeek's attack makes it possible to copy, forge
Read More
Subscribe