Data Protection — News

Mesh networks may make SQL injection attacks more persistent

Massive website compromises using a technique known as <a href="http://www.csoonline.com/article/499964/sql-injection-attacks-led-to-heartland-hannaford-breaches-">SQL injection</a> has long been a top security concern for Web developers and site owners. Now, the attacks may become harder to detect and prevent, according to one security firm's analysis.

Robert Lemos | 20 Jun | Read more

IT admins gone wild: 5 rogues to watch out for

You can't survive without them. They wield enormous power over your systems, networks, and data -- the very lifeblood of your organization. Few people outside IT have any understanding of what they do, and fewer still exercise any oversight over their actions.

Dan Tynan | 21 Jun | Read more

ATO scams do the rounds

It's almost the end of financial year, and the Australian Taxation Office (ATO) has warned companies and consumers to beware of phishing emails and telemarketing calls.

Hamish Barwick | 21 Jun | Read more

A new security architecture for the cloud

Members of the Open Group's Security for the Cloud and SOA Project have launched a new <a href="http://www.csoonline.com/article/505871/the-curse-of-cloud-security">security architecture for the cloud</a>, to help security organizations better understand the unique security aspects of cloud computing.

Bob Violino | 20 Jun | Read more

Left to your own devices

I've been watching a challenge grow on the horizon. It comes up over and over again in conversations with security and technology executives alike, and if it hasn't hit your organization yet...well, let's just say that it probably has and you're just missing it. It's the broad issue of mobility and the consumerization of IT. Simply put, it's all those fun little devices that your employees are bringing to you and saying "support me."

Bob Bragdon | 21 Jun | Read more

Vulnerability analyzers offer Web scanning as an option

Web scanning is different from vulnerability scanning because it looks for bugs in the Web apps themselves, rather than in the software installed on the Web server. For example, all of the vulnerability scanners told us about an old embedded system on our network vulnerable to a cross-site scripting attack because of an old version of PHP. 

Joel Snyder | 20 Jun | Read more

How we tested vulnerability analyzers

We developed a test methodology and evaluation criteria in six main areas, including results reporting, product controls and manageability, scan results, vulnerability workflow features, interoperability, and updates and protocol support.

Joel Snyder | 20 Jun | Read more

Four Safer Ways to Pay Online

Who has your private info? Who knows, given how common <a href="http://www.pcworld.com/businesscenter/article/229301/are_you_a_data_breach_victim_heres_what_to_do.html">security breaches</a> have become. And credit card information is one of the most common types of <a href="http://www.pcworld.com/article/227255/protect_your_data_from_the_breach_epidemic.html">personal data</a> we volunteer online. So what can you do to minimize credit card fraud? Well, you can't stop the break-ins, but here are four ways to keep your funds out of the hands of the bad guys.

Jeff Bertolucci | 19 Jun | Read more

Writerspace site warns members after LulzSec hack

Literary website Writerspace.com has admitted that almost a quarter <a href="Literary website Writerspace.com has admitted that almost a quarter of the 62,000 email logins published after an attack by LulzSec came from its user database. ">of the 62,000 email logins published</a> after an attack by LulzSec came from its user database.

John E Dunn | 18 Jun | Read more