Internet

Credit card skimmers hide in web page image files

A particularly nasty form of consumer credit card theft centers on the use of skimming devices embedded in credit card machines at locations such as gas stations and convenience stores. As a customer swipes a card, the hidden ...

Security

Supply-chain hack attacks are worrying investigators

What do you know about supply-chain attacks? In January, an article in CSO said it's when a weak link in your enterprise security might lie with partners and suppliers. It's when someone infiltrates your system through ...

Security

New firewall protects cellphones from security threat

Cyber security researchers at Ben-Gurion University of the Negev (BGU) developed an innovative firewall program that adds a missing layer of security in Android cellphones and monitors for malicious code.

Security

New tool detects malicious websites before they cause harm

Malicious websites promoting scams, distributing malware and collecting phished credentials pervade the web. As quickly as we block or blacklist them, criminals set up new domain names to support their activities. Now a research ...

page 2 from 2