September 23, 2016
Via: Computer WeeklyThe cyber attack on French television network TV5Monde in April 2015 was aimed at destruction, according to the network’s managing director Yves Bigot. Bigot was a member of a panel discussing how to defend businesses from cyber aggressors, which concluded […]
September 8, 2016
Via: CIOThere is serious personal risk associated with a healthcare data breach, especially with multiple connected devices and health record systems generating and storing a patient’s sensitive health data. Every person interacting with an online system needs a digital identity, and […]
September 8, 2016
Via: InfoWorldAs quantum computers inch closer to reality, experts are sweating over their potential to render many of today’s cybersecurity technologies useless. Earlier this year the U.S. National Institute of Standards and Technology issued a call for help on the matter, […]
September 7, 2016
Via: CIOA CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment. Everything about the letter looked legit. “It has my display name, spelled correctly,” said Kevin O’Brien, co-founder and […]
September 6, 2016
Via: Computer WeeklyMalware is nothing new, yet malware infections are on the rise – but why is that? Why aren’t the defences we have been putting in place for the past 20 years effective? Let’s look at why. Malware creation is no […]
September 6, 2016
Via: Computer WeeklyMalware has always been one of the top cyber security concerns, with 71% of respondents to the (ISC)2 2015 Global Information Security Workforce Study citing it as a significant threat. This shows no sign of abating, particularly as today’s malware […]
September 2, 2016
Via: CSO OnlineWomen are underrepresented in every industry, at every level of companies. Even more discouraging, a report from the Wall Street Journal suggests that there are significantly less women in the higher ranks of companies, indicating that growth of a female […]
September 2, 2016
Via: InfoWorldSecurity experts have been saying for decades that human weakness can trump the best technology. Apparently, it can also trump conventional wisdom. Since passwords became the chief method of online authentication, conventional wisdom has been that changing them every month or […]
September 2, 2016
Via: Computer WeeklyWe should not be surprised that malware is becoming increasingly sophisticated. Previously rare, it is now common to find malware that has been designed to evade detection techniques. As usual, information security practitioners are in a race with attackers to […]
August 31, 2016
Via: InfoWorldPerhaps the worst news about Pokemon Go is how attackers are using it to spread malware. This is not the first time bad-guy hackers have leveraged the popularity of games to spread malicious software. Viral memes spread malware, too, via […]
August 31, 2016
Via: Computer WeeklyMalware in nearly half of cyber attacks in the past 12 months has been sneaked into organisations under the cover of encryption, a study has revealed. The demand for data privacy in the post-Snowden era is driving the use of […]
August 31, 2016
Via: Computer WeeklyCyber defence is a blended solution; multiple elements are required for it to be truly effective and for particularly evasive malware to be detected and stopped. One of the first things we need to do is to understand is that […]
August 30, 2016
Via: CSO OnlineIdentity management continues to fall into the top security efforts needed to protect information resources. However, traditional solutions rely on significant human analysis and management: analysis and management that result in high productivity costs for analysts and managers. And even […]
August 30, 2016
Via: Computer WeeklyLess than a third of organisations are prepared for security risks associated with devices making up the internet of things (IoT), a survey has revealed. Only 34% of the respondents believe their organisations accurately track the number of IoT devices […]
August 29, 2016
Via: Computer WeeklyThe Ramnit banking Trojan has relaunched its cyber crime attack activity, targeting six major banks in the UK, according to IBM X-Force researchers. The malware – which enables criminals to disable antivirus protection, take control of computers and access users’ […]
August 26, 2016
Via: SC MagazineCitizen Lab and Lookout researchers detected an active spyware capable of exploiting three iOS zero-day vulnerabilities. The vulnerabilities, collectively dubbed Trident, were combined into a malware named Pegasus by the NSO Group, an organization that reportedly specializes in “cyber war,” according […]
August 25, 2016
Via: Help Net SecurityKeeping their botnet out of law enforcement’s and other criminals’ hands is imperative for botmasters if they want to keep earning. C&C servers are the norm, but they can be tracked down, seized by the authorities and, ultimately, reveal crucial […]
August 24, 2016
Via: CSO OnlineFew would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? […]
August 24, 2016
Via: CSO OnlineLast week, Duo Security released a brief report on their Duo Insight tool for Phishing assessments. In all, 11,542 employees (400 companies) were tested, and 31-percent of them clicked the link that was included with the assessment email. Worse, 17-percent […]
July 8, 2016
Via: CSO OnlineThe callers are polite, and they sound very earnest, explaining in great detail how hackers can loot your bank accounts, steal your identity, and compromise passwords. They are intent on convincing you the threat is not only real but hackers […]