

The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or...
Holm Security continues to expand in Asia and is now opening a sales office in New Delhi,...
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as...
According to Stefan Thelberg, security expert and CEO at Holm Security, the 1177 leak could have easily been avoided if basic security measures had been in...
In Security Center, customers can administrate their assets and work with their vulnerabilities. With Organizer we create an overlying layer that enables you...
Web Scraping of Credit Cards Last year, several different e-retailers' credit card forms, on their web pages, were hijacked. Where JavaScript was injected,...
You’re Still Responsible When Outsourcing A common misconception is that outsourcing means that the liability for, as an example, personal data in relation to...
1. Simply a Programming Error? If you get a developer to set up a back door. It can be so subtle, you might mistake it for a programming error. Occasionally,...