A report just published - which identifies mobile networks as having a number of key security vulnerabilities that must be addressed - has been welcomed by Secure Browsing Service specialist Trusteer.

Trusteer, whose secure browsing service is offered by a number of banks, says that the Heavy Reading report is quite correct in identifying a potential problem with the security of mobile networks, for the simple reason that the wireless nature of the cellular networks makes them more susceptible to criminal attack.

Read more: Trusteer warns of growing security crisis for mobile networks

ANDOVER, Massachusetts, November 23, 2010 – Napatech today released a new white paper outlining how standard server hardware and Napatech intelligent adapters can be used to build affordable traffic generation systems. This promises to extend the availability of test equipment to engineers that previously could not be served due to price.

“Test systems are complex pieces of equipment, which are typically on the forefront of technology development”, said Erik Norup, President, Napatech Inc. “Development of these systems is costly and they are therefore priced accordingly. However, the high price-tag usually means that organizations can only afford to buy a few of these systems, which in turn means that development engineers have to contend for access to test resources.”

Read more: Affordable Traffic Generation

Rolling Meadows, IL, USA 23rd November 2010 —ISACA—a global association serving more than 95,000 IT governance, assurance and security professionals—will feature international cloud computing experts at its free virtual seminar and tradeshow, titled Security and Compliance in the Cloud:  Define, Defend and Regulate, from 9 a.m. to 4 p.m. (CST) on Tuesday, 8 December 2010. Attendees can participate without leaving their offices.

The event kicks off with a keynote presentation by Dave Cullinane, chief information security officer and vice president of eBay. His presentation at ISACA’s Virtual Seminar, titled Cloud Security:  Building Trust in the Cloud, will detail his experience in building a trustworthy reputation while creating a cloud computing presence.

Read more: ISACA Virtual Seminar to Help Clear the Cloud Confusion

 London, 23rd November 2010 - A report on the Associated Press, which goes into some detail about a string of real-world bank account draining sessions by hackers, highlights the fact that hackers are repurposing the ZeuS trojan to target business bank account users.

 And the reason for this diversification, says Idappcom, the vulnerability testing specialist, is that business bank accounts tend to have higher bank balances, as well as having several people – and therefore several sets of user credentials - to access the account online within a given business.

 

"Ever since ZeuS first appeared back in the summer of 2007, we have been tracking its steady progress, especially since the trojan horse was successfully modified in the spring of last year, when hackers discovered they could extend the malware's functionality through the use of extensible code and scripting," said Ray Bryant, Idappcom's CEO.

Read more: Extra security needed as hackers repurpose ZeuS to target business bank accounts

Rolling Meadows, IL, USA (23 November 2010)—ISACA’s Certified Information Systems Auditor (CISA) designation has been recognized as the highest paying IT security certification by the  IT Skills and Certifications Pay Index (ITSCPI) from independent research firm Foote Partners. ISACA’s Certified Information Security Manager (CISM) designation also earned a place on the list of highest wage earners.

Monitoring certifications since 1999, Foote Partners’ ITSCPI surveyed pay premiums for 457 individual certified and noncertified IT skills. The industry-leading benchmark survey is updated and published four times a year.

Read more: ISACA’s CISA Named Highest Paying Security Certification in Foote Partners’ Report