News

INFORMATION SECURITY – MARKET OVERVIEW

 

Security Pros Brace for Industrial IoT Cyber Attack
(17/03/2017)
The vast majority of IT security professionals are expecting in an increase in attacks targeting Industrial Internet of Things deployments, finds a Tripwire survey.

View more

 

 

 

 

IaaS Security: Threats and Protection Methodologies
(16/03/2017)
Cloud infrastructure services face unique security threats that require a variety of different protection methodologies.

View more

 

 

 

 

Anti-Virus Solutions Fail to Protect Against Ransomware
(15/03/2017)
A recent KnowBe4 survey of more than 500 organizations found that 33 percent of respondents experienced a ransomware attack in the past year…

View more

 

 

 

 

Multi-Factor Authentication: A Critical Security Tool for Enterprises
(14/03/2017)
Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

View more

 

 

 

 

Tech Companies Weigh Responses to WikiLeaks Exposure
(11/03/2017)
Following WikiLeaks’ publication earlier this week of classified documents stolen from the CIA, major technology companies, including Apple, Samsung, Microsoft and Cisco, have been scrambling to assess the risks posed to their customers…

View more

 

 

 

 

WikiLaeks CIA docs show it’s not 2017, it’s 1984. Now what?
(11/03/2017)
Commentary: Even though I’m no terrorist, the unconfirmed WikiLeaks disclosures about the CIA scare me. They might scare you too. Here’s what to do.

View more

 

 

 

 

Protecting the enterprise against mobile threats
(10/03/2017)
Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

View more

 

 

 

 

Firm Accuses Uber App of Being a Privacy Nightmare
(10/03/2017)
Uber’s ride-sharing app is putting sensitive personal and corporate data at risk, according to research from Appthority. However, Uber says that research is flawed.

View more

 

 

 

 

Cloudflare’s Cloudbleed: Small Risk, But Data Lingers

(03/03/2017)

Cloudflare’s recent data breach – dubbed “Cloudbleed” – was strikingly unique. To wit, a software bug caused a random regurgitation of data from the memory of its servers, potentially exposing passwords, cookies and chat logs.

View more

 

 

 

 

Researchers find 132 apps on Play Store infected with iFrame malware

(03/03/2017)

Researchers from Palo Alto Networks have revealed that they discovered 132 Android apps on the Google Play store which were infected with “tiny hidden iFrames that link to malicious domains in their local HTML pages”.

View more

 

 

 

 

The Challenges of Minimizing Data Security Risks

 (03/03/2017)

Software as a service (SaaS) is more and more becoming interesting to small and medium-sized businesses as a great solution to their IT needs. It’s not only about the lower costs.

View more

 

 

 

 

Ransomware and Cyber-Insurance: What It Means for You and Your Company

 (03/03/2017)

Ransomware attacks are rising dramatically, with the U.S. Justice Department estimating that their number tripled last year to 4,000 every day. Every industry is seeing an increasing threat, with the education and health sectors particularly hard hit.

View more

 

 

 

 

CloudBleed: check if you visited sites affected by CloudFlare’s security isue
(26/02/2017)
The security issue at hand caused the servers to “run past the end of a buffer” which returned memory that contained private information.

View more

 

 

 

 

Cloudbleed bug: Everything you need to know
(25/02/2017)
The internet has a new security bug called Cloudbleed and it’s pretty bad. We explain what it is, how it affects you and what you can do.

View more

 

 

 

 

Google Cracks Key Security Code, Calls for New Standard
(24/02/2017)
Hash functions are designed to compress large amounts of data into a message digest as a cryptographic requirement

View more

 

 

 

 

Email Compromises, Phishing Top Insider Threats
(24/02/2017)
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type.

View more

 

 

 

 

Home Ministry’s Website Hack: A Wake-Up Call
(17/02/2017)
Hackers gained unauthorized access to information on the website of the Ministry of Home Affairs on February 12, prompting authorities to temporarily block it, according to news media reports.

View more

 

 

 

 

#RSAC: The Cyber-Circus: What the Rise of Hacking Everyday Things Means for All of Us
(16/02/2017)
Stop the spread of FUD—Fear, Uncertainty and Doubt. Instead of spreading rumors, get the facts about risks and attacks, and tell people about them. She urged the audience not to generalize or talk in fear-inducing statements.
 

View more

 

 

 

 

Shadow IT clouds Security
(16/02/2017)
A recent study revealed that security professionals face a new kind of shadow IT due to the widespread migration of custom apps to the cloud

View more

 

 

 

 

Android phone hacks could unlock millions of cars
(16/02/2017)
IN THE ERA of the connected car, automakers and third-party developers compete to turn smartphones into vehicular remote controls, allowing drivers to locate, lock, and unlock their rides with a screen tap.

View more

 

 

 

 

Cyber Security lessons offered to schools in England
(11/02/2017)
Schoolchildren in England will be offered lessons in cyber security in a bid to find the experts of the future to defend the UK from attacks.

View more

 

 

 

 

IBM, AT&T and Others have another crack at IoT Security
(10/02/2017)
IBM and AT&T have teamed up with several security vendors to form a new group focused on improving IoT security and influencing industry standards.

View more

 

 

 

 

IT Leaders and Execs pass the buck on cyber response
(09/02/2017)
IT decision makers and C-level executives both believe it is the other’s job to manage the response to a cybersecurity incident, according to new research from BAE Systems.

View more

 

 

 

 

Invisible attacks breach enterprises in 40 countries
(08/02/2017)
Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software. The primary suspects are the infamous GCMAN and Carbanak groups.

View more

 

 

 

 

Cyber Expert: Vendor FUD Distorts Online Threats
(06/02/2017)
A leading British cybersecurity expert has hit out at over-hyped vendor “fear uncertainty and doubt” (FUD) as distorting the public perception of online risks.

View more

 

 

 

 

Banks Show a Woeful Lack of Data Security
(06/02/2017)
About 83% of consumers believe their banks are secure from cyber attack and trust it with their money and most sensitive data too, but their faith is misplaced.

View more

 

 

 

 

The Evolution of Phishing
(05/02/2017)
If you’ve got an email account or social media profile, it’s likely you’ve come across phishing of some kind before. In a sentence, phishing is the fraudulent attempt to steal personal information by social engineering: the act of criminal deception.

View more

 

 

 

 

The year in security: Trends 2017
(04/02/2017)
In its latest Trends paper, titled Security Held Ransom, ESET has identified nine key areas in information security that are likely to have a notable impact in 2017.

View more

 

 

 

 

Deloitte: Machine Learning to Soar in IoT as DDoS Attacks Top 10 Million (12/01/2017)
Machine learning and artificial intelligence may be set for their close-up: Deloitte predicts that more than 300 million smartphones, or more than one-fifth of units sold in 2017, will have machine learning capabilities built inside within the next 12 months…

View more

 

 

 

 

 

 

 

Spora Is The Highly-Sophisticated Future Of Ransomware
Security researchers have spotted the next evolution of ransomware. It’s called Spora, and it’s been designed to be as easy-to-use as the online stores you frequent. Maybe even easier.

View more

 

 

 

 

Russia, China and the US are biggest geopolitical cybersecurity threats
(11/01/2017)
Russia and China have the more advanced cyber capabilities and are the highest potential of severe impact, but the US and its allies also pose global security concerns, according to a report released this morning by Flashpoint.

View more

 

 

 

 

Google Broadens Encryption Options with Cloud Key Management (11/01/2017)
Google is broadening its continuum of encryption options available on Google Cloud Platform (GCP), with the addition of the Cloud Key Management Service (KMS).

View more

 

 

 

 

DDoS Interruptions Spiked 162% in 2016
(05/01/2017)
Service interruptions from distributed-denial-of-service (DDoS) attacks rose 162% in 2016—mainly thanks to the activities of the Mirai internet of things (IoT) botnet.

View more

 

 

 

 

Ransomware took in $1 billion in 2016–improved defenses may not be enough to stem the tide
(05/01/2017)
Increased user awareness of phishing threats, better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against ransomware this year, according to some security experts, but others expect the attacks to continue to increase.

View more

 

 

 

 

Massachusetts Makes Data Breach Records Public Online
(04/01/2017)
The state of Massachusetts has upped the ante on data breach transparency: The Office of Consumer Affairs and Business Regulation has decided to make reports of potential identity theft available to the public on its website.

View more

 

 

 

 

HTTPS scanning in Kaspersky antivirus exposed users to MITM attacks (04/01/2017)
Security vendor Kaspersky Lab has updated its antivirus products to fix an issue that exposed users to traffic interception attacks.

View more

 

 

 

 

4 information security threats that will dominate 2017
(29/12/2016)
As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017.

View more

 

 

 

 

Password Alternatives: How to Secure your Enterprise’s Data
(23/12/2016)

Passwords are still a popular target for hackers. While small password hacks that go unnoticed, they can still have a catastrophic effect. Take for example this year’s Yahoo password leak that compromised more than 500 million accounts, and affected the likes of Dropbox, LinkedIn, KFC, the Office of Personnel Management and many more.

View more

 

 

 

 

A Malware Cocktail Shakes Up Cerber Ransomware Infections
(22/12/2016)
The cyber-criminals behind a fresh ransomware campaign are celebrating the new year with a malware cocktail—one that’s spreading the Cerber ransomware.

View more

 

 

 

 

BlackBerry unveils BlackBerry Secure for enterprise IoT mobile security

(08/12/2016)
BlackBerry on Thursday unveiled a comprehensive mobile-security platform for a wide variety of Internet of Things devices connected to enterprises. Called BlackBerry Secure, the mobile security software and related services will combine key technologies from recent BlackBerry acquisitions

View more

 

 

 

 

Kaspersky Security Bulletin 2016. The ransomware revolution
(08/12/2016)
In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses.

View more

 

 

 

 

 

Security pros most worried about clouds, mobile
05/12/2016
Around 60 percent of companies were able to assess security risks in cloud environments, down 7 points compared to last year. Mobile devices scored at 57 percent, down by 8 percentage points compared to last year.

View more