Searched for: "point of sale vulnerabilities"
- Security (14)
- Software (3)
- Banking (2)
- Project Management (2)
- Apps (1)
- Broadband (1)
- Business Intelligence (1)
- Collaboration (1)
- Cxo (1)
- Hardware (1)
- It Employment (1)
- Leadership (1)
- Networking (1)
- Outsourcing (1)
- Servers (1)
- Smartphones (1)
- Social Enterprise (1)
- Wi-Fi (1)
- Windows (1)
- Windows 8 (1)
About 49 results for "point of sale vulnerabilities"
Learn the nuts-and-bolts of how a memory scraping, credit card stealing Point-Of-Sale (POS) malware works and identify strategies that the user can implement to make it hard for th...
Zimbra's Olivier Thierry talks about the three C's that open source firms must support, the need to be market driven in tech, and how his firm's solutions address security and data...
During late February and early March, attackers made off with a cache of personal information stored in Ebay's servers.
Authentication require two or more factors: \"Something only the user knows\", \"Something only the user has\" and \"Something only the user is\". The factors must be validated by ...
Greg Shultz takes a look at some of the changes you can expect to see in Windows 8.1 Update 1. Will it bring Windows XP, mouse, and keyboard users back into the fold?
In retail, one of the greatest points of theft vulnerability is at the Point of Sale (POS). This paper reveals current POS employee theft statistics and quantifies the exposure ret...
The arrest of the Freedom Hosting CEO has set in motion a crisis for TOR and unleashed a java exploit designed to expose Freedom Hosting users.
Training is still an important part of security plans and other IT initiatives, but it's not always welcome. Here are five common training mistakes to avoid.
Dominic Vogel looks into a new security solution that relies on micro-virtualization to isolate untrustworthy desktop tasks from enterprise networks.
Guest Contributor Lisa Petrucci explains why you can't forget the importance of hardware even when you've moved to the cloud.