The PCI Security Standards Council issued a new guidance to help IT administrators deploy and manage cloud environments and virtual data centers while ensuring PCI compliance where necessary. The PCI DSS Virtualization Guidelines Information Supplement, released June 14, covers a number of virtualization areas, including different types of virtualization, specific notes on cloud computing and […]
Trend Micro updated its network-analysis tools and threat-management services to help organizations stop advanced persistent threats before they break into the network and do serious damage. The line of Real-Time Threat Management network appliances monitor network traffic for incoming malware and outgoing botnet activity, Trend Micro said June 13. The appliances provide organizations with detailed […]
White House officials unveiled a series of initiatives designed to help implement information technology to the national power grid to make it smarter, more efficient and secure. The National Science Technology Council outlined its plans to modernize the power grid in rural areas and to create a “smart grid innovation hub” in a report titled […]
The United States is helping fund and develop technology that can be used to bypass Internet censors in other countries, according to The New York Times. The State Department has several initiatives in place to establish cell phone networks and other communications systems in various countries to bypass the repressive regimes’ control over the Internet, […]
The International Monetary Fund was targeted by attackers over several months earlier this year, The New York Times reported. Many security experts are speculating the attackers may have had some support from a nation-state. The cyber-attackers appeared to have deliberately infected a computer at the IMF with malware designed to steal information, according to The […]
RSA Security made waves this week when it offered to replace SecurID tokens for a certain subset of its customers in the wake of the March data breach where attackers apparently stole intellectual property relating to the company’s two-factor authentication technology. It claimed that attackers were interested in only a certain segment of the industry, […]
Adobe plans to address several bugs in its Reader and Acrobat software as part of its scheduled quarterly update. All of the vulnerabilities being patched are rated critical, said Adobe in its pre-notification Security Advisory on June 9. Adobe is expected to roll out the quarterly security updates for Adobe Reader and Acrobat on June […]
Cyber-criminals are running their malware and spam operations like a business, security researchers said. The nature of cyber-crime has changed from a few years ago. Cyber-criminals often have ties to organized crime and are not just script kiddies messing around in the basement. The evolution means the criminal enterprise has similar infrastructure requirements and business […]
Spanish police have detained three men they believe to be members of the hackers collective “Anonymous,” according to news reports. Authorities believe the trio took part in a number of DDoS (distributed denial-of-service) attacks against Sony PlayStation Network and government Websites in Algeria, Chile, Colombia, Egypt, Iran, Libya and New Zealand, Spain’s national police said […]
Cyber-attackers have breached financial giant Citigroup’s Web portal and gained access to customer credit card information. The company said the most sensitive information remained safe. The perpetrators broke into Citi Account Online and viewed customer names, account numbers and some contact information such as email addresses, Citigroup said in a statement June 9. Social Security […]