Security News


A newly discovered POS Trojan is a perfect example of how easy it is for malware makers to come up with new malware - they can simply recycle code used in older malicious software. Trojan.MWZLesson...

At Black Hat, two recent Boston University computer engineering graduates revealed software and hardware hacks against the latest versions of the popular Square Reader.





The majority of organizations have increased their POS security budgets during the last two years, but many of them are still using and investing in outdated technologies, such as antivirus. A Bi...

