Quantcast
Channel: Hackers – Unisys Blogs
Browsing latest articles
Browse All 13 View Live

Image may be NSFW.
Clik here to view.

Secure coding must become an integral part of software development

The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.  Alongside this, comes the ever-present threat from...

View Article



Image may be NSFW.
Clik here to view.

Security in the News

IT leadership should keep their eyes on cyber security headlines this month, understanding that the need for effective solutions for securing their information grows more real each day. Recent articles...

View Article

Image may be NSFW.
Clik here to view.

Cyber Crime: How to Prevent an Attack and Mitigate Damage

Over the past couple of weeks, we’ve seen reports of major defense contractors and systems integrators being the target of sophisticated cyber-attacks that appear to have leveraged vulnerabilities...

View Article

The Six Biggest Hacking Threats and How to Deal with Them

There are six big hacking threats facing IT today, and I’m sorry to tell you that the hackers are winning. In just the past month, the world’s biggest bourse operator by market value, Hong Kong...

View Article

Theft by Hacking: Three of the Top Six Threats (Part I)

In my last post, I explained why no organization is safe from hackers. Hackers are successful because most IT organizations still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—to...

View Article


Image may be NSFW.
Clik here to view.

Theft by Hacking: Three of the Top Six Threats (Part II)

My last two posts — The Six Biggest Hacking Threats and How to Deal with Them and Theft by Hacking: Three of the Top Six Threats — are part of a series covering the six biggest threats hackers pose to...

View Article

Building Castles in the Sky: Mobile Hacking and Its Impact on CyberSecurity

Today we are featuring a special guest blogger, Tom Kellerman, Commissioner on The Commission on Cyber Security for the 44th Presidency of the United States of America. Just a few key questions, and we...

View Article

Year in the Rear View Mirror: Part III

Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was...

View Article


Trick or Treat

Halloween is a few weeks away, and it’s time to start working on costumes for the kids. You feel really creative this year, so you search for “Halloween costume make your own” in your favorite Internet...

View Article


Microsoft End-of-Support for Windows XP Date Approaching: Can’t Migrate then...

Microsoft End-of-Support for Windows XP is April 8, 2014. Despite recommendations for migration to Windows 7/8, estimates show that XP still powers one out of every four corporate PCs.   Budget...

View Article

Law Enforcement and Justice, Part One: The Challenges of Modern Policing

How Safe is Our World? From global terrorist threats and trans-national organised crime, to hackers accessing personal information to facilitate multi-million dollar fraud, law enforcement agencies...

View Article

Who Was That Masked Man?

It’s Halloween, and you doze off in your comfy chair with a bowl full of goodies, waiting for trick-or-treaters to arrive. The bell rings, and you open up the door to see the masked faces of your...

View Article

Wearable Devices, Hackers, and Consumer Attitudes on Healthcare Security

Given that an electronic medical health record (EHR) is worth hundreds, even thousands of dollars on the black market – compared to just 25 cents for a typical credit card number1 – it is no surprise...

View Article

Browsing latest articles
Browse All 13 View Live




Latest Images