Thursday, May 19, 2011

Bill.com is a Finalist for the 2011 Red Herring Top 100 North America Award

PALO ALTO, Calif.--(BUSINESS WIRE)--Bill.com, the leader in integrated bill payment, online invoicing and cash management solutions for small- and medium-sized businesses (SMBs) and accounting/bookkeeping firms, announced today it has been selected as a Finalist for Red Herring's Top 100 North America award, a prestigious list honoring the year’s most promising private technology ventures from the North American business region.
http://www.bill.com
“Bill.com is pleased to be recognized by Red Herring as one of the 200 most innovative private technology companies in North America”
The Red Herring editorial team selected the most innovative companies from a pool of hundreds from across North America. The nominees are evaluated on both quantitative and qualitative criteria, such as financial performance, technology innovation, quality of management, execution of strategy, and integration into their respective industries.
This unique assessment of potential is complemented by a review of the actual track record and standing of a company, which allows Red Herring to see past the “buzz” and make the list a valuable instrument for discovering and advocating the greatest business opportunities in the industry.
"This year was very rewarding," said Alex Vieux, publisher and CEO of Red Herring. "The global economic situation has abated and there are many great companies producing really innovative and amazing products. We had a very difficult time narrowing the pool and selecting the finalists. Bill.com shows great promise therefore deserves to be among the Finalists. Now we’re faced with the difficult task of selecting the Top 100 winners of Red Herring North America. We know that the 2011 crop will grow into some amazing companies that are sure to make an impact."
“Bill.com is pleased to be recognized by Red Herring as one of the 200 most innovative private technology companies in North America,” said Rene Lacerte, CEO of Bill.com. “Achieving finalist standing shines light on our commitment to creating a better way for small businesses and accountants to manage financial processes and collaborate with their payment network, leveraging all the benefits that cloud computing and the best of today’s technology has to offer. We look forward to advancing to the next stage of the process and wish all 200 finalists the very best of luck.”
Finalists for the 2011 edition of the Red Herring 100 North America award are selected based upon their technological innovation, management strength, market size, investor record, customer acquisition, and financial health. During the several months leading up to the announcement, hundreds of companies in the telecommunications, security, Web 2.0, software, hardware, biotech, mobile and other industries completed their submissions to qualify for the award.
The Finalists are invited to present their winning strategies at the Red Herring North America Forum in Hollywood, California, June 13-15, 2011. The Top 100 winners will be announced at a special awards ceremony the evening of June 15 at the event.
About Bill.com
Bill.com is an on-demand accounts payable and accounts receivable application for CPAs and small and midsized businesses. Bill.com users can receive, route and pay invoices electronically — they never have to touch a paper bill again — resulting in time and cost savings to finance personnel of over 50% versus manual accounts payable and check writing processes. Invoices are emailed, scanned or faxed into the Bill.com service. Digital images of invoices are then routed electronically for approval, ensuring a complete audit trail and eliminating lost or mishandled paper. Bill.com handles check printing and mailing as well as electronic payments, and uses enterprise-class fraud protections that are impractical for small and midsized businesses to implement on their own. Bill.com integrates with popular desktop and on-demand accounting packages, ensuring consistency of financial data and streamlined financial planning, reporting and audit activities. Bill.com has received numerous awards including Bill.com's Zen (Zero Entry) service winning Accounting Today's Best New AP/AR Product for 2011, a 2009 Innovation Award from CPA Technology Advisor, a 4-star rating from PC Magazine, a 2010 Barlow Monarch Innovation Award for innovation in financial services. Bill.com was recently named to the Red Herring Global 100.

Contacts

Ruder Finn for Bill.com
Jeff Seedman, (415) 249-6763
seedmanj@ruderfinn.com

ProPay’s Social-M Payment Platform, Zumogo, Wins the 2011 ETA Technology Showcase Challenge

ETA 2011 Annual Meeting & Expo
http://www.propay.comLEHI, Utah--(BUSINESS WIRE)--ProPay (www.propay.com), an industry leader in Merchant Services, End-to-End Payment Security, credit card processing and electronic payment services, is pleased to announce that Zumogo, ProPay’s Social-M Payment application is the winner of the 2011 ETA Technology Showcase Challenge. Zumogo (pronounced “Zoo-MOE-Go”) allows merchants and consumers to connect in an entirely new way. Consumers are able to locate merchants, engage in dialogue with merchants, find events and deals, and make payment all from their Smartphone.
“Products like Zumogo and others represented in the Showcase demonstrate the tremendous innovation of which this industry is capable.”
ProPay entered Zumogo into the Technology Showcase Challenge along with several other participants during ETA’s 2011 convention held in San Diego, Calif. The challenge was comprised of six different settings in a hotel environment ranging from a hotel patio to a spa. Each participant demonstrated their new innovative technology in real-life situations and then voted by attendees from the convention. Zumogo received an overwhelming majority of the votes.
“We are pleased to offer vendors an opportunity to showcase their new technologies to a group of payment industry professionals,” said Carla Balakgie, Chief Executive Officer of the Electronic Transaction Association. “Products like Zumogo and others represented in the Showcase demonstrate the tremendous innovation of which this industry is capable.”
ProPay’s Zumogo represents the entry of ProPay into the mobile market. “We are pleased and proud to have won the ETA Technology Showcase Challenge,” said Gary Goodrich, Chief Executive Officer at ProPay. “Receiving this honor from industry peers is very exciting. Zumogo represents the continued evolution of ProPay’s products, which enables businesses of all sizes to accept payments in a simple, secure and affordable way.”
Zumogo is a new mobile payment technology allowing Smartphones to be used, not only as a payment device, but also as a social technology, allowing merchants and consumers to communicate with each other in real-time. Additionally, the social m-payment platform allows the consumer to find merchants, contact them for information and make payment all from the same device. Zumogo eliminates sensitive information from the transaction process, meaning no payment data is passed through the merchant’s system or stored on the consumer’s Smartphone.
About ProPay
Since 1997, ProPay has provided simple, secure and affordable payment solutions for organizations ranging from the small, home-based entrepreneur to multi-billion-dollar enterprises. ProPay is a leading provider of complete End-to-End Payment Security solutions that reduce, and may even eliminate, the organization’s risk of having sensitive payment data compromised. ProPay is the recipient of the prestigious 2010 ETA ISO of the Year award. ProPay is a 14 year old, privately held company, headquartered in Lehi, Utah. For information, visit www.propay.com. For more information about Zumogo, please visit www.zumogo.com.

Contacts

ProPay, Inc.
Travis Allen, 801-341-5609
travis.allen@propay.com

VeriFone and MICROS First to Bring NFC Services to the Table


Consumer Adoption of Mobile Phone-Initiated Payments in Restaurants Requires a Pay at the Table Acceptance Solution
NRA Show 2011
CHICAGO--(BUSINESS WIRE)--VeriFone Systems, Inc. (NYSE: PAY), and MICROS Systems, Inc. (NASDAQ: MCRS), today announced a solution that integrates restaurant management systems with smart mobile devices, allowing consumers to pay at the table with electronic wallets on mobile phones utilizing Near Field Communications (NFC). The solution, which accommodates traditional payment cards and other mobile applications such as line-busting, is being demonstrated here this week at the NRA 2011 show (MICROS booth #4200).
Central to the integrated solution is the VeriFone PAYware Mobile Enterprise mobile POS system, which adapts smartphones and wireless PDAs to securely accept payment transactions and utilizes VeriFone services to interface with MICROS table management and order management solutions as well as the card payment networks.As the premier providers in, respectively, the secure payments and hospitality solutions markets, VeriFone and MICROS are partnering to deliver the first practical NFC service that will allow restaurants to accommodate an emerging wave of NFC-enabled applications, including payments and redemption of electronic coupons and promotions.
“This integration with VeriFone will enable MICROS to provide multiple mobile products on one single platform, rather than requiring separate devices for separate functions,” said MICROS Chief Technology Officer Michael L. Russo. “In addition, MICROS and VeriFone are creating a must-have bridge to bring fast-emerging NFC payments to the table.”
NFC is a standards-based two-way communications technology that makes it easier for electronic devices, such as smartphones, to exchange digital content, and connect electronic devices with a touch. It is interoperable with existing contactless card technologies.
In the payments world, NFC enables an electronic transaction infrastructure for contactless payment, loyalty and value-added applications to be utilized by consumers via a mobile wallet that contains electronic versions of credit and debit cards, loyalty accounts, and gift cards.
“Widespread adoption of NFC requires a restaurant solution, but consumers are not willing to hand over their mobile phones to the wait staff,” said Paul Rasori, VeriFone senior vice president of marketing. “MICROS and VeriFone are combining forces to deliver a low-cost, services-based solution that allows restaurants to provide NFC payment convenience to consumers without having to make a large, up-front investment.”
PAYware Mobile Enterprise incorporates a PCI-approved PIN debit keypad, which allows merchants to leverage dramatically lower transaction costs, as well as a 2D bar code scanner for tasks such as inventory control. With PAYware Mobile Enterprise, items can be scanned, payment cards accepted and receipts emailed to customers or transmitted to a nearby wireless printer with ease.
The integrated solution is expected to be available from select resellers in the second half of the year.
Additional Resources:
About MICROS Systems, Inc.
MICROS Systems, Inc. provides enterprise applications for the hospitality and retail industries worldwide. Over 330,000 MICROS systems are currently installed in table and quick service restaurants, hotels, motels, casinos, leisure and entertainment, and retail operations in more than 130 countries, and on all seven continents. In addition, MICROS provides property management systems, central reservation and customer information solutions under the brand MICROS-Fidelio for more than 26,000 hotels worldwide, as well as point-of-sale, loss prevention, and cross-channel functionality through its MICROS-Retail division for more than 100,000 retail stores worldwide. MICROS stock is traded through NASDAQ under the symbol MCRS.
About VeriFone Systems, Inc. (www.verifone.com)
VeriFone Systems, Inc. (“VeriFone”) (NYSE: PAY) is the global leader in secure electronic payment solutions. VeriFone provides expertise, solutions and services that add value to the point of sale with merchant-operated, consumer-facing and self-service payment systems for the financial, retail, hospitality, petroleum, government and healthcare vertical markets. VeriFone solutions are designed to meet the needs of merchants, processors and acquirers in developed and emerging economies worldwide.

Contacts

VeriFone
Pete Bartolik, 508-283-4112
pete_bartolik@verifone.com
or
MICROS
Louise Casamento, 443-285-8144
LCasamento@MICROS.com

30 Tactics to ePayment Management from CyberSource

Insider's Guide to ePayment Management from CyberSource
Click to Download
Download Now:
Insider's Guide to ePayment Management
30 Tactics Leading Merchants Use to Capture Hidden Profits
CyberSource's newly published report details 30 ePayment management tactics leading online merchants are using to improve business results. Discover proven tactics that can help you cut costs, increase sales conversion and improve operating efficiency.
Download your copy: The Insider's Guide to ePayment Management
The Insider's Guide gives you 30 proven ePayment tactics the best merchants use to:
  • Control the cost of accepting and processing online payments
  • Increase sales conversion and revenue retention
  • Reduce fraud and fraud management expense
  • Cut the cost of PCI compliance and increase security
Based on CyberSource's field experience with leading online merchants, merchant surveys and analysis of industry data, this guide offers more than just statistics. The Insider's Guide conveniently compiles and discusses real-world payment management tactics you can implement to improve business results.





CyberSource

Enhanced by Zemanta

Gemalto Wins Two Awards at LTE World Summit 2011: “Best contribution to LTE standards” and “Best enabling technology”

LTE World Summit 2011
AMSTERDAM--(BUSINESS WIRE)--Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, announces it has won two Informa LTE Awards in the Best contribution to LTE standards“ and “Best enabling technology“ categories at the LTE World Summit 2011. The awards recognize Gemalto’s innovation capacity, which materializes in a range of complete LTEsolutions.
http://www.gemalto.com
“Best contribution to LTE standards“ and “Best enabling technology“ categories at the LTE World Summit 2011. The awards recognize Gemalto’s innovation capacity, which materializes in a range of complete LTE solutions.”
Gemalto’s solutions include the LTE Full-IP Over-the-Air platform for instant subscription activation and the LTE Universal Integrated Circuit Cards (UICC) for secure user authentication to 4G networks and access to IP-based multimedia services. Gemalto is already one of the world’s leading technology suppliers behind a number of high-profile commercial LTE deployments, notably with NTT Docomo in Japan, as well as Metro PCS and Verizon Wireless in the U.S.
LTE is a very important enabler for mobile operators looking to deliver enhanced subscriber experience for demanding mobile applications such as high-definition video streaming,” commented Philippe Vallée, Executive Vice President Telecom at Gemalto. “Gemalto is proud to be recognized for our latest LTE advancements in automated device configuration and 4G service installation, as we continue to deliver on our innovation promise.”
About Gemalto
Gemalto (Euronext NL0000400653 GTO) is the world leader in digital security with 2010 annual revenues of €1.9 billion and over 10,000 employees operating out of 87 offices and 13 Research & Development centers in 45 countries.
Gemalto is at the heart of our evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain, and work—anytime, anywhere, in ways that are convenient, enjoyable and secure. Gemalto delivers on the growing demands for personal mobile services, identity protection, payment security, authenticated online services, cloud computing access, modern transportation, e-healthcare and e-government services. Gemalto does this by providing secure software, a wide range of secure personal devices, and managed services to wireless operators, banks, enterprises and government agencies.
Gemalto is the world leader for electronic passports and identity cards, two-factor authentication devices for online protection, smart credit/debit and contactless payment cards, as well as subscriber identification modules (SIM) and universal integrated circuit cards (UICC) in mobile phones. Also, in the emerging machine-to-machine applications Gemalto is a leading supplier of wireless modules and machine identification modules (MIM). To operate these solutions and remotely manage the software and confidential data contained in the secure devices Gemalto also provides server platforms, consulting, training, and managed services to help its customers achieve their goals.
As the use of Gemalto’s software and secure devices increases with the number of people interacting in the digital and wireless world, the Company is poised to thrive over the coming years.
For more information visit www.gemalto.comwww.justaskgemalto.comblog.gemalto.com,, or follow @gemalto on twitter.

Contacts

Gemalto:
Peggy Edoire, +33 4 42 36 45 40
Europe, Middle East & Africa
peggy.edoire@gemalto.com
or
Jessi Marshall, +1-512-257-3902
North America
jessi.marshall@gemalto.com
or
Yvonne Lim, +65 6317 3730
Asia Pacific
yvonne.lim@gemalto.com
or
Ramzi Abdine, +55 11 5105 7659
Latin America
ramzi.abdine@gemalto.com

Enhanced by Zemanta

Internet and Mobile (Lack of) Security News 5/16 through 5/19/2011

Selected/Aggregated from E-Secure-IT

This Free IT-Security news feed is provided by E-Secure-IT; the most comprehensive and complete Business Risk Management Intelligence Service and IT-Security Risk and Threat Early Warning Service available in the market today. Visit us at www.e-secure-it.com or email more-info@e-secure-it.com for more information on our available services.


Australia Credit card fraud: '57c for every $1k'
(from ITNews at 19-5-2011)
The Australian Institute of Criminology has revealed that fraud accounted for 57.15 cents of every $1,000 transacted using credit and charge cards in 2009. The institute said in a report that credit card fraud had increased 55 percent since 2006, when it accounted for only 36.93 cents in every $1,000 transacted. By comparison, the institute saw only a slight increase in debit card-related fraud, while cheque fraud continued its long-term decline.... read more»
Canada is the new global phishing hotspot
(from IT Business at 19-5-2011)
Canadian Internet users beware: according to research from global security vendor Websense, our home and native land is now the number two country in the world to host phishing sites. Research conducted by Websense between January and May of this year found that Canada climbed up to second, up from 13th last year, on the list of countries hosting malicious content. The number one spot went to the U.S., with Egypt coming in third, Germany in fourth, the U.K. in fifth, the Netherlands in sixth,... read more»
How to stay safe on Sony's PlayStation Network
(from CNet at 19-5-2011)
If you are a Sony PlayStation Network (PSN) customer you are probably getting a little paranoid. First there was the data breach from last month that exposed customer data and forced Sony to take the network down. And now, just days after Sony got the service back up and running, it has taken the PSN password reset service offline because it was allowing people to change other customers' passwords if they knew their e-mail address and birth date--information that was stolen in the attack.... read more»
Virus-free honeymoon over / Smartphones' global rise exposes long-secluded mobile network
(from Yomiuri at 19-5-2011)
A computer virus that allows unauthorized third-party access to stored data has infected smartphones in Japan, industrial sources said, the first time such a case has been confirmed in this country. Devices were found to have been infected by the virus in February and March, the sources said. Smartphones use operating systems--such as Apple's iOS and Google's Android--that are common to all markets globally, unlike conventional cell phones sold in Japan. This means smartphone viruses could... read more»
Malware rose by 46pc in Q1, Cisco report shows
(from Silicon Republic at 19-5-2011)
The number of unique malware types on the web increased by 46pc between January and March of this year, a new security report suggests. Ciscos Global Threat Report, which covers the first quarter of 2011, found 105,536 instances of unique web malware in March 2011 compared to January 2011 when there were 72,294 instances of unique web malware. Business users experienced an average of 274 web malware encounters per month during Q1, up 103pc compared to 2010.... read more»
IT industry news: Malware 'must be dealt with fast'
(from computeach at 19-5-2011)
Businesses must act quickly to tackle malware, according to Richard Moffitt, consultant systems engineer at Trusteer. "What we're finding is that attacks happen very quickly it's an automated process, [and] there are toolkits that allow fraudsters to generate new pieces of malware in minutes," he continued.... read more»
Six rising threats from cybercriminals
(from Computer World at 19-5-2011)
Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector.... read more»
Spam and Phishing Landscape: May 2011
(from Symantec at 19-5-2011)
The unexpected raid and resulting death of Osama Bin Laden shocked the world. As always, spammers were quick to jump on this headline and send a variety of spam messages leveraging the event. The Fallout from the Death of Osama Bin Laden section includes samples of some of the spam monitored in different languages. The effect of the Rustock shutdown from the previous month continued this month. After falling 27.43 percent in March, the average daily spam volume fell another 5.35 percent in Ap... read more»
Hackers Increase Smartphone Attacks
(from News In A Box at 19-5-2011)
Reuters reports that there has been an increase in the number of smartphone hacking, which makes software giants and phone operators invest more and more in security. The increase in hacker attacks aiming at smartphones proves to be a difficult time for the software companies and the startups and telecom operators. But, on the other hand, hackers attacks seem to very profitable for the security providers. They create big business opportunities for companies that create antivirus programs, s... read more»

Is an 'alternate Internet' the only refuge from mounting threats?
(from Government Computer News at 19-5-2011)
The rapid adoption of mobile computing is creating vulnerabilities and threats faster than they are being addressed, a panel of industry and government experts said on May 18. Mobile is hot, and it will remain hot, said John Landwehr, Adobe Systems senior director of security solutions and strategy. Landwehr said that mobile, wireless access to the Internet is likely to surpass wired access as early as the end of this year, and most of mobile devices do not have the same level of security as ... read more»
How to stay safe on Sony's PlayStation Network
(from CNet at 19-5-2011)
If you are a Sony PlayStation Network (PSN) customer you are probably getting a little paranoid. First there was the data breach from last month that exposed customer data and forced Sony to take the network down. And now, just days after Sony got the service back up and running, it has taken the PSN password reset service offline because it was allowing people to change other customers' passwords if they knew their e-mail address and birth date--information that was stolen in the attack.... read more»
Virus-free honeymoon over / Smartphones' global rise exposes long-secluded mobile network
(from Yomiuri at 19-5-2011)
A computer virus that allows unauthorized third-party access to stored data has infected smartphones in Japan, industrial sources said, the first time such a case has been confirmed in this country. Devices were found to have been infected by the virus in February and March, the sources said. Smartphones use operating systems--such as Apple's iOS and Google's Android--that are common to all markets globally, unlike conventional cell phones sold in Japan. This means smartphone viruses could... read more»
Malware rose by 46pc in Q1, Cisco report shows
(from Silicon Republic at 19-5-2011)
The number of unique malware types on the web increased by 46pc between January and March of this year, a new security report suggests. Ciscos Global Threat Report, which covers the first quarter of 2011, found 105,536 instances of unique web malware in March 2011 compared to January 2011 when there were 72,294 instances of unique web malware. Business users experienced an average of 274 web malware encounters per month during Q1, up 103pc compared to 2010.... read more»


Say goodbye to era of Mac malware immunity
(from MSNBC at 18-5-2011)
You know you've finally arrived as a software platform when hackers start gunning for you. Such is the predicament that Apple's success has brought: Sophisticated malware has started to appear that's directed specifically at Apple machines. For years, security experts predicted that as Apple gained market share, cybercriminals would turn their attention from Windows machines toward Mac attacks. Now it appears to really be happening.... read more»

IT industry news: Malware 'must be dealt with fast'
(from computeach at 19-5-2011)
Businesses must act quickly to tackle malware, according to Richard Moffitt, consultant systems engineer at Trusteer. "What we're finding is that attacks happen very quickly it's an automated process, [and] there are toolkits that allow fraudsters to generate new pieces of malware in minutes," he continued.... read more»
Spam and Phishing Landscape: May 2011
(from Symantec at 19-5-2011)
The unexpected raid and resulting death of Osama Bin Laden shocked the world. As always, spammers were quick to jump on this headline and send a variety of spam messages leveraging the event. The Fallout from the Death of Osama Bin Laden section includes samples of some of the spam monitored in different languages. The effect of the Rustock shutdown from the previous month continued this month. After falling 27.43 percent in March, the average daily spam volume fell another 5.35 percent in Ap... read more»

Hackers Increase Smartphone Attacks
(from News In A Box at 19-5-2011)
Reuters reports that there has been an increase in the number of smartphone hacking, which makes software giants and phone operators invest more and more in security. The increase in hacker attacks aiming at smartphones proves to be a difficult time for the software companies and the startups and telecom operators. But, on the other hand, hackers attacks seem to very profitable for the security providers. They create big business opportunities for companies that create antivirus programs, s... read more»
Mobile hacking sets off security gold rush
(from ibnlive at 19-5-2011)
Hackers are increasingly aiming attacks at smartphones, touching off a race among software giants, start-ups and telecom operators seeking to cash in on ways to help consumers protect themselves. As the previously fragmented smartphone market coalesces around big operating systems like Apple's iPhone and Google's Android, it has become a more attractive target for hackers seeking to maximize damage with one hit. That's creating a big business opportunity for everyone from traditional antiv... read more»
Android User Data Easily Stolen
(from informationweek at 18-5-2011)
The weak link when it comes to security on Android devices, say University of Ulm researchers, is the ClientLogin authentication protocol when used on open Wi-Fi networks. This tool is used to authenticate user account details with the Android Market and Google services. It passes the authToken via secured https connections. The problem is the returned authToken, which can remain valid for up to two weeks. When used on insecure http networks, hackers can sniff out the authToken and then use ... read more»

Reduce Your Android Security Risks
(from informationweek at 18-5-2011)
Hackers and criminals have been targeting Windows on the desktop for years simply because it is the biggest platform out there in terms of market share. You want to go after the biggest audience possible to increase your odds of success in finding a system that is unprotected. Now that smartphones are such a large market, with tens of millions of devices being sold and activated each quarter, the temptation is just too big to pass up.... read more»
So many users, so many devices, so many problems
(from The Register at 18-5-2011)
Mobile users are different to the home worker and they're all different to a branch worker, so how do you find out what they need and give it to them effectively. Finding out what end users want from their desktop and comparing it to what you think they need can be a sobering experience. Performance, fast access to data and the latest software are likely to be high on their list of requirements, while security and minimal management overhead will be high on yours.... read more»

Launching the U.S. International Strategy for Cyberspace
(from Whitehouse at 17-5-2011)
Today, I am proud to announce the United States first, comprehensive International Strategy for Cyberspace (pdf). The International Strategy is a historic policy document for the 21st Century one that explains, for audiences at home and abroad, what the U.S. stands for internationally in cyberspace, and how we plan to build prosperity, enhance security, and safeguard openness in our increasingly networked world. Today, Homeland Security Advisor John Brennan and I were joined by Secretary of ... read more»
AusCERT 2011: Eugene Kaspersky calls for Internet Interpol
(from Computer World at 17-5-2011)
With cybercrime now the second largest criminal activity in the world, measures such as the creation of an 'Internet Interpol' and better cooperation between international law enforcement agencies are needed if criminals are to be curtailed in the future, Kaspersky Labs founder and security expert, Eugene Kaspersky, has argued. Speaking at AusCERT 2011, the Moscow-based Kaspersky said the last five years had proved to be the "Golden Age" of cyber crime with the criminal activity now ranked se... read more»
Feds: Electronic medical records at risk
(from Detnews at 17-5-2011)
The nation's push to computerize medical records has failed to fully address longstanding security gaps that expose patients' most sensitive information to hackers and snoops, government investigators warn. Two reports released today by the inspector general of the Health and Human Services Department find that the drive to connect hospitals and doctors so they can share patient data electronically is being layered on a system that already has glaring privacy problems. Connecting it up could ... read more»
Geek.com Infects Visitors with Malware
(from Softpedia at 17-5-2011)
Attackers have managed to inject rogue IFrames into different portions of the site, both within articles and the site's main pages like home, about us, etc. According to Umesh Wanve, a senior security research engineer at Zscaler, there are multiple infections and the iframes take visitors to different malicious websites. One example is the rogue code injected into a May 13 article about Call of Duty: Modern Warfare 3 details being leaked, which redirects visitors to an exploit kit.... read more»
Cybercriminals Release Fake Microsoft Security Update
(from securitynewsdaily at 16-5-2011)
Internet criminals are hoping to make a quick buck today (May 10) by spoofing Microsoft's monthly security update with a fake bulletin of their own. The scam email is labeled "Urgent: Critical Security Update," and informs the recipient that Microsoft has issued a "high-priority" security fix for Windows, which can be downloaded via a link in the message, the security website Websense reports....
Hackers steal, publish Fox employee passwords
(from Net-Security at 16-5-2011)
A group of attackers who clearly have it in for Fox Broadcasting have managed to access a company server with hundreds of their employees' email usernames and passwords. Then they published the collected information on the Internet and invited people to use it to "ravage" online accounts that have the same login credentials:... read more»

Zeus Trojan's Source Code Leaked to Masses
(from securitynewsdaily at 16-5-2011)
The source code to the Zeus Trojan, a notorious piece of bank-account-stealing malware previously sold in underground cybercrime markets, is now out in the open and available for free download. "This weekend we found the complete source code for this crime kit being leaked to the masses on several underground forums as well as through other channels," Peter Kruse from the security firm CSIS wrote. The Zeus code is being distributed in a .zip file; Kruse ran it in his lab, and said, "It wor... read more»
New Online Attacks Target Small Businesses
(from securitynewsdaily at 16-5-2011)
A small Internet service provider on British Columbia's picturesque Vancouver Island was hit by a distributed denial-of-service (DDoS) attack this week that disrupted Web use for thousands of customers. The attack heralds a shift in the size of organizations cyberattackers are now targeting. The attack hit Islandnet.com on Monday, and then resurfaced two days later in a "widespread, sustained way," that prevented customers, including a grocery store chain and the Vancouver Island Firefighters... read more»
How Cloud Computing is Aiming to Secure and Encrypt Data
(from securitynewsdaily at 16-5-2011)
Whether it's a Microsoft commercial telling you to take it to the cloud or you happen to work on some of the most cutting-edge computing issues in modern times, it's hard to escape cloud computing. The uses for cloud computing, in which companies or individuals can run applications on shared data centers, seems limitless. But theyre not. One of the constraints of cloud computing is that encrypted information cant be worked on within the cloud because theres no way to keep that data safe once ... read more»
Android Malware Jumps 400 Percent as All Mobile Threats Rise
(from EWeek at 16-5-2011)
Cyber-attackers are gunning for Googles Android as they take advantage of a user base that is unaware, disinterested or uneducated in mobile security, according to a recent research report. Malware developers are increasingly focusing on mobile devices, and Android malware has surged 400 percent since summer 2010, according to the Malicious Mobile Threats Report 2010/2011 released May 11. The increase in malware is a result of users not being concerned about security, large number of download... read more»
The UK Treasury is the most cyber-attacked Govt. department with one attack a day
(from thenextweb at 16-5-2011)
Googles Zeitgeist Conference is now in its sixth year, an event that draws together business leaders, politicians and some of the greatest thinkers across industry. And with the first day of the two-day event in Hertfordshire now well underway, Chancellor George Osborne revealed that Governmental departments were hit with over 20,000 emails from hostile intelligence agencies in the past year alone, in what the Chancellor referred to as pre-planned attacks.... read more»
UK Government under cyber-attack says Chancellor George Osborne
(from Sophos at 16-5-2011)
George Osborne MP, the UK's Chancellor of the Exchequer, has said that British government computers are on the receiving end of over 20,000 malicious email attacks every month. In a keynote address at the Google Zeitgeist event in London today, Osborne claimed that foreign intelligence agencies are responsible for many of the attacks, with the intention of stealing sensitive information....read more»
Cyber attacks present serious UK security risk
(from ibtimes at 16-5-2011)
Speaking at the Google Zeitgeist event in Hertfordshire, UK chancellor George Osborne highlighted the growing threat cyber crime is presenting the government in its attempts to make more public service data available online. Citing the current cyber attack tech giant Sony are suffering as an example of the growing problem, the chancellor claimed that in 2010 alone the government suffered at least one serious web-based attack on its computer systems a day -- threats which according to Osborne ... read more»
Time for America to Get Cyber-Serious
(from heritage at 16-5-2011)
The online threats facing America read like an ever-expanding encyclopedia of dangers to the freedoms, prosperity, and security of all Americans. Cybersecurity has become a crucial component of national security. Responses to cyber threats, however, have largely lagged because of a focus on technologies rather than the people behind the technologies. Cyber competition is just one instrument that Americas enemies are using to undermine the common defense. To meet these challenges, the United S... read more»
How security chief's bank details leaked
(from The Age at 16-5-2011)
Security firm Symantec's Australian chief has revealed how his personal credit card details were leaked by a Melbourne restaurant, which he said highlighted the need for mandatory privacy breach notification laws. The security chief, Craig Scroggie, told of his experience at a Symantec roundtable discussion in Sydney last week which revealed the average cost of a data breach to Australian companies was $2 million. He said the government should implement Australian Law Reform Commissioner (... read more»
IU experts find flaws in US web protection plan
(from Indiana Daily Student News at 16-5-2011)
The White House proposed new cybersecurity legislation Thursday that aimed to protect the country against threats to the national infrastructure and the economy, but it was too small a step, according to IU cybersecurity experts. Fred Cate, a professor in the Maurer School of Law and the director of the Center for Applied Cybersecurity Research, said cybersecurity attacks are a huge problem in todays society.... read more»


Enhanced by Zemanta

Disqus for ePayment News