October 16, 2019
Via: Hot for SecurityGlobal shipping and mailing service Pitney Bowes has fallen foul of a ransomware attack that has encrypted data on its computer systems and disrupted customer access to its online services. In a statement published on its website, Pitney Bowes advised […]
October 7, 2019
Via: CSO OnlineFollowing in the footsteps of former FBI Director James Comey and other top law enforcement officials, Attorney General William Barr is taking a swing at the growing prevalence of encryption across the digital landscape, with a particular renewed focus on […]
Threats & Malware, Vulnerabilities
September 30, 2019
Via: Help Net SecurityThe verdict is in: quantum computing poses an existential threat to asymmetric cryptography algorithms like RSA and ECC that underpin practically all current Internet security. This comes straight from the National Academy of Science’s Committee on Technical Assessment of the […]
August 22, 2019
Via: Security WeekThe cybercriminals behind the recent ransomware incident that impacted over 20 local governments in Texas are apparently demanding $2.5 million in exchange for access to encrypted data. The incident took place on August 16, when 23 towns in Texas revealed […]
August 7, 2019
Via: Dark ReadingEnterprise security teams have long struggled with the complexity of encryption and key management. While integrated solutions are starting to make it easier to encode and decode critical data, the goal of enterprisewide encryption has greatly increased the time it […]
July 29, 2019
Via: Security AffairsIn 2018, global malware volume recorded by SonicWall hit a record-breaking 10.52 billion attacks. The situation is better in the first half of 2019, when SonicWall recorded 4.8 billion attacks, a 20% drop compared to the same time period last […]
July 12, 2019
Via: Help Net SecurityThe increasing adoption of digitalization and globalization of enterprises have made IT resources prone to cyber attacks. This has increased the demand for encryption management solutions which will help prevent such cyber attacks. Enterprises are implementing BYOD policies and integrating […]
Cyber-crime, Hacker, Malware, Threats & Malware
June 20, 2019
Via: Hot for SecurityRansomware attacks are intensely targeting local governments around the US, shutting down their systems. And most of the government appear to ignore the FBI’s warning against giving in to hacker demands. With a population of only 35,000 residents, Riviera Beach […]
May 23, 2019
Via: CSO OnlineA new report that looked at millions of connections from IoT devices present on enterprise networks found that over 40% of them do not encrypt their traffic. This means a large number of such devices are exposed to man-in-the-middle (MitM) […]
May 16, 2019
Via: Dark ReadingOnline attackers are trying to obscure their encrypted traffic in an attempt to evade detection, using a technique known as “cipher stunting,” according to Internet infrastructure and security firm Akamai. Cipher stuffing modifies the fingerprint of communications encrypted with secure […]
April 8, 2019
Via: Security IntelligenceWhile cloud computing is far from a magic bullet for all your data storage and security woes, organizations are enjoying meaningful benefits in the form of cost-efficiency, on-demand scalability, heavy upfront capital shifted to recurring operational expenses, augmented resources and […]
March 27, 2019
Via: Help Net SecurityIn 2018, SonicWall recorded the decline of cryptojacking, but more ransomware, highly targeted phishing, web application attacks and encrypted attacks. The company’s annual threat report, compiled based on threat intelligence obtained from 1+ million sensors around the world, marks a: […]
Cyber-crime, Malware, Threats & Malware, Virus & Malware
March 11, 2019
Via: Security AffairsThe STOP ransomware made the headlines because it is installing password-stealing Trojans on the victims’ machines. Experts observed the ransomware also installing the dreaded Azorult password-stealing Trojan on victim’s machine to steal account credentials, cryptocurrency wallets, documents and more. AZORult […]
Email security, Malware, Phishing
February 25, 2019
Via: Help Net Security83 percent of security professionals believe that employees have accidentally exposed customer or business sensitive data at their organization. Accidental data breaches are often compounded by an organizational failure to encrypt data prior to it being shared – both internally […]
January 17, 2019
Via: Help Net SecurityA new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security controls, installed encryption tools protect just four percent of breached files. Meanwhile, compliance-focused […]
January 9, 2019
Via: Help Net SecurityThe amount of encrypted traffic online has grown exponentially. This growth has occurred in the wake of the Snowden revelations, as well as the continuous stream of stories about corporate data leaks and hacks. As a response to these challenges, […]
January 8, 2019
Via: Help Net SecurityThe global network encryption market size is expected to grow from $2.9 billion in 2018 to $4.6 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 9.8% during the forecast period. Major growth factors for the market include […]
December 24, 2018
Via: Security WeekThe latest Android iteration brings along a great deal of security improvements, including better encryption and authentication, Google says. With Android 9 (also called Android Pie), the Internet search giant focused on aspects such as platform hardening, anti-exploitation, hardware-backed security, […]
December 14, 2018
Via: Threat PostChanges to how data is encrypted can help developers ward off data leakage and exfiltration. Google is making a few tweaks to its tools for Android mobile developers to boost the security of their wares – an apropos announcement against […]
Network security, Privacy protection
November 7, 2018
Via: Hot for SecurityResearchers at Netherlands-based Radboud University, which is active in almost all scientific fields, have discovered grave security flaws in several popular solid-state drives (SSD) that promise full disk encryption. In a nutshell, they can be cracked. Self-encrypting drives are regarded […]