Application security, Security
April 23, 2020
Via: Computer WeeklyZoom, the videoconferencing application that has captured the zeitgeist of 2020, has announced it will be rolling out a new version supporting advanced encryption to provide increased protection for its users. The firm shot to prominence in March as millions […]
Cyber-crime, Malware, Phishing
March 18, 2020
Via: Computer WeeklyThe total volume of phishing emails and other security threats relating to the Covid-19 coronavirus now represents the largest coalescing of cyber attack types around a single theme that has been seen in a long time, and possibly ever, according […]
March 16, 2020
Via: Computer WeeklyThe National Cyber Security Centre (NCSC) has urged the public to follow online safety advice to the letter as more evidence emerges of cyber criminal groups exploiting the Covid-19 coronavirus for malicious ends. As extensively reported over the past few […]
January 2, 2020
Via: Computer WeeklyThe California Consumer Privacy Act (CCPA) and a related internet of things (IoT) privacy law, SB-327, formally came into effect on 1 January 2020 in a landmark move that will strengthen cyber security protections for Californians and paves the way […]
December 23, 2019
Via: CSO OnlineThe one common drawback to most SD-WAN solutions is that they address your WAN connectivity needs as if they exist in isolation. This isn’t unique. One of the biggest challenges facing organizations undergoing rapid digital transformation is that each new […]
December 23, 2019
Via: CSO OnlineOnce again, the holiday season is upon us! For me, this time of year means spending quality time with my family and friends. It represents a time for joy and kindness towards others. Unfortunately, not everyone shares this sentiment. During […]
September 13, 2019
Via: Computer WeeklyThe cyber security industry needs to embark on a charm offensive and address its image problem if it is to successfully recruit more diverse teams in terms of gender, race, sexuality and neurodiversity, according to a panel of sector experts […]
September 9, 2019
Via: Computer WeeklyBlockchain is distributed ledger technology. The premise of blockchain is that everyone involved in the chain has the same version of the truth at the same time. Each block in the chain builds on the previous and each has a […]
May 30, 2019
Via: Help Net SecurityAs massive data breaches continue to make international headlines and the Internet is an integral part of our daily lives, consumers are now grasping the risks they face. In a new F-Secure survey, 71% of respondents say they feel that […]
May 29, 2019
Via: Security WeekAlso tracked as APT27, TG-3390, Bronze Union, and Lucky Mouse, the threat group has been active since at least 2010, targeting hundreds of organizations worldwide, including U.S. defense contractors, financial services firms, a European drone maker, and a national data […]
February 13, 2019
Via: Radware BlogCustomers put their trust in companies to deliver on promises of security. Think about how quickly most people tick the boxes on required privacy agreements, likely without reading them. They want to believe the companies they choose to associate with […]
Cloud security, Cyber-crime, Data loss
December 20, 2017
Via: Help Net SecurityData centers aren’t exactly going extinct, but given the massive shift to public clouds, you need to make some significant adjustments if your mindset doesn’t already include or understand the cloud. The problem is that not every organization knows how […]
December 20, 2017
Via: Security WeekThe National Cybersecurity & Communications Integration Center (NCCIC) of the U.S. Department of Homeland Security (DHS) on Monday published an analysis report on a piece of malware designed to target industrial safety systems. FireEye and Dragos reported last week that […]
Cyber-crime, Network security, Threats & Malware
December 20, 2017
Via: Security IntelligenceThe cyberthreat landscape has evolved over time, and 2017 saw an increase in attacks over the 90 million intrusions recorded in 2016. While threats such as ransomware are not new, this year saw a major paradigm shift in which malicious […]
Network security, Security, Tech
December 19, 2017
Via: Security IntelligenceSecurity conferences offer great opportunities to learn about the latest innovations and trends in the industry. They allow practitioners to interact directly with vendors and to network with their peers, putting a human spin on the technology-driven, often impersonal business […]
Cyber-crime, Security, Threats & Malware
December 18, 2017
Via: Help Net SecurityHere’s an overview of some of last week’s most interesting news and articles: Keylogger found in Synaptics driver on HP laptops For the second time this year, a security researcher unearthed a keylogger in a driver used on a number […]
Cyber-crime, Data loss, Hacker
December 15, 2017
Via: Dark ReadingA proposed new law could make it legal for companies to hack back against attacker. But will it work? Destruction, loss of data, intellectual property theft, fraud, embezzlement, disruption to business, restoration—globally, the costs of dealing with hacking are staggering. […]
Cyber-crime, Malware, Threats & Malware
December 15, 2017
Via: The HillA hacker used a new type of malware targeting industrial control systems against a critical infrastructure organization in an attack that resulted in operations shutting down, according to cybersecurity experts. Cybersecurity firm FireEye, which has dubbed the malware “Triton,” saidThursday that its […]
December 14, 2017
Via: Help Net SecurityResearch revealed massive increases in scripting attacks and overall malware attempts against midsize companies throughout Q3 2017. In fact, WatchGuard Technologies found that scripting threats accounted for 68 percent of all malware during the period. The findings reinforce expectations of […]
Threats & Malware, Vulnerabilities
October 31, 2017
Via: Dark ReadingA security researcher was able to view some of Google’s most severe vulnerabilities due to flaws in the company’s internal bug tracking system, he said. The Issue Tracker, or Buganizer, as it’s known internally, is used among researchers and bug […]