SearchSecurity

New & Notable

Problem Solve

MajikPOS: How to detect new POS malware

A new POS malware downloads a RAM scraper to avoid detection. Expert Nick Lewis explains the tricks MajikPOS uses to target retail terminals and how to defend against it.

News

Chrome users targeted through hijacked extensions

News roundup: Hackers leveraged eight hijacked Chrome extensions to attack 4.8 million browser users. Plus, Cloudflare stopped protecting a neo-Nazi website from DDoS attacks, and more.

News

Military may reuse enemy cyberweapons

The U.S. Defense Intelligence Agency wants to isolate, study, customize and re-engineer malware from adversaries to be used as its own offensive cyberweapons.

News

Maersk admits to $300 million in ransomware costs

Danish shipping giant A.P. Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    CISSP practice quiz: Asset Security and data control

    Domain 2 of the CISSP exam, known as asset security, covers data security control, classification, ownership and more. Test your knowledge with this 10-question practice quiz.

  • Get Started

    CISSP Domain 2 prep: Data encryption methods, asset security

    This Security School will help prepare you for Domain 2 of the CISSP exam, providing overviews of data encryption methods, data ownership concepts and asset protection.

  • Get Started

    CAPTCHA

    A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.

View All Get Started

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Alternative operating system security

    Little risk from decryption of Secure Enclave Processor

    Experts and Apple said despite the leak of the iPhone Secure Enclave Processor encryption key that can be used to decrypt firmware code, user data and biometric information is still safe.

  • Government information security management

    Military may reuse enemy cyberweapons

    The U.S. Defense Intelligence Agency wants to isolate, study, customize and reengineer malware from adversaries to be used as its own offensive cyberweapons.

  • Web browser security

    Chrome users targeted through hijacked extensions

    News roundup: Hackers leveraged eight hijacked Chrome extensions to attack 4.8 million browser users. Plus, Cloudflare stopped protecting a neo-Nazi website from DDoS attacks, and more.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close