. home.aspx

TRENDING NEWS

home.aspx
   

    STRATFOR HACKER HAMMOND HELD IN CONTEMPT FOR REFUSING TO ANSWER GRAND JURY QUESTIONS

    Oct 13, 2019

    Just months before he was to be released from federal prison where he is serving time for hacking intelligence firm Statfor and releasing information to WikiLeaks , activist and hacker Jeremy Hammond, was found to be in contempt of court for failing to answer questions before a grand jury in the Eas...

    SCMAGAZINE
    READ MORE

    /news-article.aspx?ID=69236923

    SURVEY REVEALS WIDESPREAD IGNORANCE OVER ATTACK THAT AFFECTS MOST COMPANIES

    Oct 09, 2019

    According to a new research survey, 68% of IT security stakeholders aren't sure whether they've experienced a Pass the Hash attack, and 4% don't even know what this globally prevalent form of attack is. These almost fantastical findings, released today by One Identity, came from a survey...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69186918

    APT GROUPS EXPLOITING FLAWS IN UNPATCHED VPNS, OFFICIALS WARN

    Oct 08, 2019

    U.S. and U.K. agencies warn consumers to update VPN technologies from Fortinet, Pulse Secure and Palo Alto Networks. State-sponsored advanced persistent threat (APT) groups are using flaws in outdated VPN technologies from Palo Alto Networks, Fortinet and Pulse Secure to carry out cyber attacks on t...

    THREATPOST
    READ MORE

    /news-article.aspx?ID=69136913

    DDOS ATTACK: WHAT IS IT AND HOW TO STAY PROTECTED AGAINST IT?

    Oct 05, 2019

    DDoS attack aims at bringing services down by bombarding them with so much traffic that their services and infrastructure are unable to handle it. In a Distributed Denial of Service (DDoS) attack, multiple compromised systems are used to target a server with a huge volume of traffic. Typically, a bo...

    CYWARE
    READ MORE

    /news-article.aspx?ID=69106910

    NEARLY 70 US GOVERNMENT ORGANIZATIONS HIT BY RANSOMWARE SINCE JANUARY

    Oct 03, 2019

    Ransomware gangs, intent on stealing American dollars, have struck at least 621 targets in the US government, education, and healthcare sectors since January. A report into stateside ransomware attacks, released on October 1 by antivirus company Emisoft, which is an associate partner in Europol&rsqu...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69086908

    6 GOVERNMENT INITIATIVES IN 2019 THAT BOOSTED CYBERSECURITY

    Oct 01, 2019

    Cybersecurity is becoming a growing concern for individuals, organizations, and the government. Government agencies around the world are taking various steps to build a better online ecosystem. Let’s look at a few government initiatives against cybersecurity that came to the spotlight this yea...

    CYWARE
    READ MORE

    /news-article.aspx?ID=69066906

    PENNSYLVANIA MIGHT BE SECOND STATE TO CRIMINALIZE CYBER-FLASHING

    Sep 30, 2019

    Pennsylvania could follow Texas to become the second US state to make cyber-flashing illegal.
    Philadelphia County state representative Mary Isaacson told Infosecurity Magazine that she plans to introduce a bill to ban the unsolicited electronic transmission of sexually explicit and obscene im...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69046904

    MASAD SPYWARE USES TELEGRAM BOTS FOR COMMAND-AND-CONTROL

    Sep 27, 2019

    A freshly discovered commercial spyware dubbed the “Masad Clipper and Stealer” is using Telegram bots as its command-and-control (C2) hub. Masad harvests information from Windows and Android users and also comes with a full cadre of other malicious capabilities, including the ability to ...

    THREATPOST
    READ MORE

    /news-article.aspx?ID=69036903

    5G AND IOT: HOW TO APPROACH THE SECURITY IMPLICATIONS

    Sep 26, 2019

    Experts from Nokia, iboss and Sectigo talk 5G mobile security for internet of things (IoT) devices in this webinar YouTube video (transcript included).When it comes to the next generation of mobile networks, 5G promises a more Internet of Things-friendly ecosystem with vast improvements over the cur...

    THREAT POST
    READ MORE

    /news-article.aspx?ID=69016901

    AUTHENTICATION AND ITS EVOLUTION IN CONTEXT OF CYBER DEFENSE

    Sep 25, 2019

    With hacks and personal information compromises occurring on a regular basis, it is essential to take a look at the authentication systems. Attackers are infiltrating into systems by taking advantage of weak passwords. The exact point in time when a password system was designed is something we may n...

    CYWARE
    READ MORE

    /news-article.aspx?ID=68986898

    MALWARE ATTACK PROMPTS US TRANSPORT AUTHORITY TO AXE ONLINE STORE

    Sep 24, 2019

    An American transport authority has responded to a malware attack by permanently closing its online store. The Southeastern Pennsylvania Transport Authority (SEPTA) shuttered the site Shop.SEPTA.org within an hour of discovering that the personal data of 761 customers had been stolen in a data-skimm...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=68966896

    CYBERCRIME DAMAGE EXPECTED TO HIT $6 TRILLION MARK ANNUALLY BY 2021

    Sep 23, 2019

    Poor cybersecurity measures and unprotected data make organizations vulnerable to data loss and cyber threats. Cyber threats are becoming increasingly popular nowadays. Reports have shown that data breaches, phishing, ransomware attacks, cryptojacking, cyber squatting, and threats to connected devic...

    AITHORITY
    READ MORE

    /news-article.aspx?ID=68936893

    COMBINING HUMAN EXPERTISE AND AUTOMATION TO CLOSE THE CYBER SKILLS GAP

    Sep 23, 2019

    The cybersecurity skills shortage has gained a lot of attention in recent years, and for good reason. Despite various education, upskilling and reskilling programs that have all attempted to close this gap, the results have been minimal. According to (ISC)2, there are currently 2.93 million unfilled...

    SECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=68946894

    CYBER ATTACK TARGETS TRAVIS CENTRAL APPRAISAL DISTRICT, DEMANDS RANSOM

    Sep 19, 2019

    A ransomware cyber attack targeted the Travis Central Appraisal District last week, according to a release from the organization Thursday. While TCAD is still working to get all its systems back up and running in the next one or two days, it says its core systems have been restored, daily operations...

    KXAN
    READ MORE

    /news-article.aspx?ID=68916891

    CISA LAUNCHES PRESIDENT’S CUP CYBERSECURITY COMPETITION

    Sep 18, 2019

    The Cybersecurity and Infrastructure Security Agency (CISA) announced the first-annual President’s Cup Cybersecurity Competition, an interagency effort to identify, challenge, and reward the “best personnel supporting cybersecurity and cyber excellence” in the government. The compe...

    MERITALK
    READ MORE

    /news-article.aspx?ID=68886888

    TACKLING CYBER-ATTACKS ON INDUSTRIES, THE HONEYWELL WAY

    Sep 18, 2019

    As cyber attacks on businesses continue to grow and tend to outsmart the security structures put in place, there is an increased demand for more innovative solutions to ward off potential threats to firms’ critical infrastructure from such depredations. India, as one of the fast-growing major ...

    THE FINANCIAL EXPRESS
    READ MORE

    /news-article.aspx?ID=68816881

    SAP SUCCESSFACTORS PERFORMANCE & GOALS SOLUTION CUSTOMERS SURPASS 5,000

    Sep 17, 2019

    Over 300 new clients chose the solution in the first half of 2019 to help keep their workforces passionate, performing and focused on the right objectives. These customers include Arrocera Los Corrales S.A. (ALCSA), CLAAS Group, Constructora EBCO S.A., Compartamos Banco and TÜV Rheinland Group....

    SOURCE
    READ MORE

    /news-article.aspx?ID=68836883

    SAP LAUNCHES NEW ACCELERATOR PROGRAM IN MUNICH

    Sep 16, 2019

    SAP.iO Foundry Munich is part of SAP’s innovation strategy and is designed to provide the startups with access to curated mentorship, exposure to SAP technology and application programmable interfaces (APIs), and opportunities to collaborate with SAP customers.The startups in the Munich cohort...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68846884

    PROTECT YOUR BUSINESS AND CUSTOMERS – INVEST IN RELIABLE CYBER SECURITY

    Sep 16, 2019

    It’s no secret that cyberattacks are on the rise. According to a Clark School study at the University of Maryland, in today’s world a website is hacked every 39 seconds. Cybercrime is one of the biggest threats facing modern businesses, but it’s not just big enterprises that are be...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=68786878

    MANAGED SERVICE PROVIDERS ARE RANSOMWARE HACKERS' NEW GOLD MINE

    Sep 15, 2019

    On July 3, employees at Arbor Dental in Longview, Washington, noticed glitches in their computers and couldn’t view X-rays. Arbor was one of dozens of dental clinics in Oregon and Washington stymied by a ransomware attack that disrupted their business and blocked access to patients’ reco...

    HOUSTON CHRONICLE
    READ MORE

    /news-article.aspx?ID=68756875

    XACTLY TO PARTICIPATE IN FIVE PANELS DURING EIGHTH ANNUAL DENVER STARTUP WEEK

    Sep 13, 2019

    Xactly, a leading innovator of sales performance management (SPM) software, today announced its participation in Denver Startup Week 2019, on Sept. 16-20 in downtown Denver. The largest free entrepreneurial event of its kind in North America, the annual Denver Startup Week brings together innovators...

    SOURCE
    READ MORE

    /news-article.aspx?ID=69166916

    NEW JERSEY COUNTIES PREPARE ELECTION DAY CYBERSECURITY

    Sep 12, 2019

    (TNS) — Representatives from Monmouth County, N.J., saw the prompt asking what would happen if their Twitter accounts and websites had been hacked and were giving out incorrect information to voters about polling times. They knew exactly what page of their manual to turn to solve the problem. ...

    GOVERNMENT TECHNOLOGY AGENCY
    READ MORE

    /news-article.aspx?ID=68726872

    SAP INTEGRATED DELIVERY FRAMEWORK EASES MOVE TO SAP S/4HANA FOR CUSTOMERS

    Sep 12, 2019

    SAP SE (NYSE: SAP) today announced the continued momentum of its SAP Integrated Delivery Framework, which helps streamline the move to SAP S/4HANA for SAP customers on partner-led projects. With SAP Value Assurance service packages and SAP Model Company services acting as the foundation for the deli...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68826882

    MICROSOFT TO IMPROVE OFFICE 365 PHISHING EMAIL NOTIFICATIONS

    Sep 11, 2019

    Microsoft is currently working on enhancing the notification system for quarantined malware or phishing messages for admins in all Microsoft 365 environments, with the new feature to roll out to customers in early October. Office 365 is part of  the Microsoft 365 software bundle which also come...

    BLEEPINGCOMPUTER
    READ MORE

    /news-article.aspx?ID=68696869

    DIGITAL IDENTITY VERIFICATION IS ONE KEY TO FIGHTING CYBERSECURITY THREATS

    Sep 10, 2019

    Because of the great amount of personal information involved, medical records command a high value on the dark web and can be listed for up to $1,000 each – 10 times more than the average credit card data breach record. Cybercriminals can then easily obtain this information and impersonate leg...

    HEALTHCARE IT NEWS
    READ MORE

    /news-article.aspx?ID=68646864

    SAP AND CUSTOMERS INNOVATE NEW WAYS FOR INDUSTRY-SPECIFIC PARTS PLANNING

    Sep 10, 2019

    These are the result of SAP’s intelligent supply chain for assets customer initiative, which brought together SAP and more than 45 customers to co-innovate in this mission-critical area. The announcement was made at the North American Supply Chain Executive Summit in Chicago.“Every busin...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68856885

    TEXAS LOCAL AUTHORITIES RECOVERING FROM MASS RANSOMWARE HIT

    Sep 09, 2019

    Local governments in Texas say they are on the mend after a large-scale coordinated devastating ransomware attack that hit 23 municipal agencies in the American state. Around August 16, United States time, malicous software was disseminated through an unnamed managed services provider that was compr...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=68566856

    AIR FORCE ASKS BOWHEAD TO PROVIDE CYBER SECURITY AND TRUSTED COMPUTING FOR INTELLIGENCE AND TARGETING

    Sep 09, 2019

    U.S. Air Force intelligence and targeting experts needed trusted-computing information exchange capability for the Air Force National Tactical Integration (AFNTI) program. They found their solution from Bowhead Cybersecurity Solutions & Services LLC in Springfield, Va. Officials of the Acquisiti...

    MILITARY & AEROSPACE ELECTRONICS
    READ MORE

    /news-article.aspx?ID=68596859

    BIGTINCAN TAKES AIM AT REVENUE ENABLEMENT WITH ASDEQLABS ACQUISITION

    Sep 05, 2019

    Bigtincan (ASX:BTH), the leader in mobile, AI-powered sales enablement automation,  today announced the acquisition of AsdeqLabs, whose platform provides support for field-based employees and mobile service capabilities, helping to usher in the next evolution of service enablement and customer ...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68606860

    PHISHING ATTACKS EXPLOIT NEW ONLINE SECURITY CHECKS IN EU, UK

    Sep 05, 2019

    Which? reported on a series of phishing attacks that masqueraded as official correspondence from Santander, Royal Bank of Scotland (RBS) and HSBC. The attack emails drew in recipients by invoking SCA. A response to the Payment Services Regulations 2017, or PSD2, SCA consists of new security checks t...

    SECURITY INTELLIGENCE
    READ MORE

    /news-article.aspx?ID=68536853

    GLUPTEBA MALWARE USES BITCOIN BLOCKCHAIN TO UPDATE C2 DOMAINS

    Sep 04, 2019

    A new variant of the Glupteba malware dropper is using the Bitcoin blockchain to fetch command and control (C2) server domains from Bitcoin transactions marked with OP_RETURN script opcodes. Glupteba has been previously distributed as a secondary payload by the Alureon Trojan as part of a 2011 campa...

    BLEEPINGCOMPUTER
    READ MORE

    /news-article.aspx?ID=68506850

    JACKSON CO. IS PREPARING FOR A POSSIBLE CYBER ATTACK

    Sep 03, 2019

    Jackson County says it’s taking steps to prepare for a ransomware attack. A ransomware attack is when a criminal infects your computer, locks you out of all your data, and you have to pay them a ransom to get it back. The attacks can target anyone, from a local homeowner to multi-million dolla...

    FOX 26 MEDFORD
    READ MORE

    /news-article.aspx?ID=68476847

    U.S. AND POLAND INK 5G SECURITY AGREEMENT AMID ANTI-HUAWEI CAMPAIGN

    Sep 02, 2019

    The U.S. and Poland agreed Monday to a deal designed to secure 5G wireless networks in the European country, a move that could result in blocking Huawei Technologies Co. and other Chinese telecommunications firms from its networks. The deal with Poland comes as the U.S. has been courting companies t...

    BLOOMBERG
    READ MORE

    /news-article.aspx?ID=68416841

    FAKE WINDOWS GAME BOOSTER SPREADS PASSWORD STEALING MALWARE

    Aug 29, 2019

    Attackers have created a fake site that impersonates the legitimate Smart Game Booster site, but instead distributes a Trojan that steals your passwords, cryptocurrency wallets, browser history, and much more. A tactic that is being seen more often is for attackers to create fake and convincing web ...

    BLEEPINGCOMPUTER
    READ MORE

    /news-article.aspx?ID=68396839

    ATTACKERS' CAPABILITIES ARE OUTPACING CISOS ABILITY TO DEFEND THEIR ORGANIZATIONS

    Aug 28, 2019

    Fortinet announced a new report by Forbes Insights it commissioned titled “Making Tough Choices: How CISOs Manage Escalating Threats and Limited Resources.” The global survey polled CISOs across various industries about the biggest challenges they’re facing and strategies they&rsqu...

    BW BUSINESSWORLD
    READ MORE

    /news-article.aspx?ID=68326832

    CARBON BLACK TAU UNCOVERS CRYPTO-MINING CAMPAIGN AFFECTING OVER 500,000 COMPUTERS

    Aug 28, 2019

    Carbon Black (NASDAQ: CBLK), a leader in cloud-native endpoint protection, recently released a threat report outlining how a well-known crypto-mining campaign has been enhanced to steal system access information for possible sale on the dark web. Dubbed "Access Mining" by Carbon Black rese...

    IBTIMES
    READ MORE

    /news-article.aspx?ID=68356835

    BIGTINCAN NAMED IN GARTNER’S MARKET GUIDE FOR SALES ENGAGEMENT PLATFORMS, MEETING ALL IDENTIFIED CAPABILITIES

    Aug 27, 2019

    Bigtincan (ASX:BTH), the leader in mobile, AI-powered sales enablement automation,  today announced it has been recognized as a Representative Vendor of Sales Engagement Platforms in all of the capabilities defined by Gartner as part of the August 2019 Market Guide for Sales Enablement Platform...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68616861

    PHISHING CAMPAIGN DELIVERS QUASAR RAT PAYLOADS VIA FAKE RESUMES

    Aug 26, 2019

    A new phishing campaign uses fake resume attachments designed to deliver Quasar Remote Administration Tool (RAT) malicious payloads onto the Windows computers of unsuspecting targets. Phishing is used by crooks to trick potential victims using social engineering techniques into handing over sensitiv...

    BLEEPINGCOMPUTER
    READ MORE

    /news-article.aspx?ID=68286828

    NORTH KOREAN CYBERATTACKS ON SOUTH AFRICA – WHAT HAPPENED TO CRYPTOCURRENCY EXCHANGES

    Aug 25, 2019

    Cryptocurrency exchanges Luno, Ice3X, AltCoinTrader, VALR, and Ovex told MyBroadband that neither North Korea nor any other attacker has breached their security. This follows recent reports that South Africa was one of 17 countries hit by North Korean attackers to raise money for its weapons of mass...

    MYBROADBAND
    READ MORE

    /news-article.aspx?ID=68256825

    DOS ATTACK DOWNS PUBLIC SERVICE WEBSITES

    Aug 22, 2019

    The websites of several state organisations in Finland were inaccessible due to a denial-of-service (DoS) attack late Wednesday night. A DoS is a cyber-attack in which the perpetrator disrupts the services of a host connected to the internet. The attack downed the websites of the Finnish Police, Tax...

    YLE
    READ MORE

    /news-article.aspx?ID=68226822

    POPULAR VPN SITE CLONED TO SPREAD MALWARE

    Aug 21, 2019

    Hackers are always using inventive ways to implant malware on people’s computers, including the cloning of a popular VPN website to spread a banking trojan. Researchers at Doctor Web’s virus lab discovered that criminals created a website that was a copy of the one belonging to virtual p...

    TECHSPOT
    READ MORE

    /news-article.aspx?ID=68186818

    MARKETERS SHOULDN’T HAVE TO BE DATA SCIENTISTS

    Aug 20, 2019

    Over the past decade, the rise of Data-Driven Marketing and Account-Based Marketing (ABM) have both followed steep trajectories, and that’s no coincidence. After all, the best ABM programs are the ones built on rich data and insights. However, the meteoric rise of data-fueled ABM has had an un...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68426842

    SMART CITY CYBERSECURITY WOEFULLY UNDERFUNDED AND VULNERABLE TO ATTACK

    Aug 20, 2019

    Cybersecurity investments in smart cities are “severely lagging” and are “seeding the future vulnerabilities of the IoT ecosystem,” according to new analysis from ABI Research. ABI finds that the financial; information and communication technologies (ICT); and defence industr...

    SMART CITIES WORLD
    READ MORE

    /news-article.aspx?ID=68136813

    AKAMAI OPENS MELBOURNE SCRUBBING CENTRE IN FIGHT AGAINST DDOS THREATS

    Aug 19, 2019

    Global cloud security and content delivery network provider Akamai has opened a new scrubbing centre in Melbourne as part of its strategy to “outpace the growing scale” of DDoS threats. Akamai says the new centre extends the overall DDoS attack fighting capability and resiliency of its p...

    ITWIRE
    READ MORE

    /news-article.aspx?ID=68076807

    HACKERS CAN FIGURE OUT PASSWORDS JUST FROM THE SOUND OF TYPING

    Aug 19, 2019

    Hackers can figure out a person’s password by simply listening to them type on a keyboard, cyber security according to a new study. Using the microphone found on a smartphone, the new method is so effective that it can be carried out in a noisy public space where multiple people are typing, re...

    THE INDEPENDENT
    READ MORE

    /news-article.aspx?ID=68106810

    3 SUREFIRE WAYS TO BUILD A BETTER CYBERSECURITY STRATEGY

    Aug 15, 2019

    Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIC, which has been compiling data on cyberattacks against government agencies since 2006, found the United States has been far and away the top victim of cyber espionag...

    GCN
    READ MORE

    /news-article.aspx?ID=68046804

    BIGTINCAN RECOGNIZED BY KEY INDUSTRY ORGANIZATIONS AS LEADER IN SALES ENABLEMENT

    Aug 13, 2019

    Bigtincan (ASX:BTH), the leader in mobile, AI-powered sales enablement automation, was presented with the MarTech Breakthrough Award for “Best Sales Enablement Software for SMBs” for the second year in a row. Additionally Bigtincan was recently named a “Sales Automation Solution&rd...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68626862

    PHISHING IS THE TOP SECURITY THREAT FOR BUSINESSES

    Aug 13, 2019

    A security service developed by the telecommunications firm Telefónica, in collaboration with McAfee and Allot, has revealed that the majority of the threats (89%) it has blocked so far are related to phishing. During the first two months in which it was deployed, the security service also di...

    TECHRADAR
    READ MORE

    /news-article.aspx?ID=67986798

    CHECK POINT & GOOGLE RESEARCHERS DISCOVER CRITICAL SECURITY FLAWS IN APPLE’S IOS

    Aug 12, 2019

    Apple’s iOS has been under lens due to a few security threats it has been exposed to. Otherwise considered to be the safest OS, a tough one to crack, researchers have found ways to expose it to malicious threats. Few threats that have cropped up include the recent ones from the security firm, ...

    PHONES WIKI
    READ MORE

    /news-article.aspx?ID=67956795

    THE CYBER ATTACK THREAT FOUND IN POPULAR PRINTERS

    Aug 11, 2019

    IoT cyber security risks are generating new threats vulnerabilities. New research exposed the risk with an office printer that has been manufactured by The world’s leading manufacturers. The research observed that networked printers in businesses, be it large and small could potentially be a m...

    TECH CHUMS
    READ MORE

    /news-article.aspx?ID=67926792

    NEW VULNERABILITY EXPOSES MICROSOFT AZURE CUSTOMERS TO A CYBERATTACK

    Aug 08, 2019

    Microsoft, on many occasions, has bragged about the security of their infrastructure including Microsoft Azure. However, the company has suffered security breaches in the past and according to a new report, Microsoft Azure users might be vulnerable to a cyberattack. As per a new data shared by Check...

    MSPOWERUSER
    READ MORE

    /news-article.aspx?ID=67896789

    HAVE WE LEARNED ANYTHING FROM MEDTECH SECURITY BREACHES?

    Aug 07, 2019

    As we move in to progressively more digital times, we see connected technology taking over more and more of our everyday activities – and of course, that includes our health management. But some in the medical device and tech industries believe that healthcare providers and manufacturers are n...

    MEDICAL PLASTICS NEWS MAGAZINE
    READ MORE

    /news-article.aspx?ID=67866786

    MADISON LOGIC ANNOUNCES ORACLE ELOQUA INTEGRATION

    Aug 07, 2019

    Madison Logic, the leading global account-based marketing (ABM) platform, today announced bi-directional integration with market-leading marketing automation platform Oracle Eloqua. This cutting-edge integration allows B2B marketers to combine best-in-class campaign management tools with Madison Log...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68386838

    XACTLY CELEBRATES SECOND-ANNUAL C.A.R.E. WEEK

    Aug 07, 2019

    Xactly, the leading innovator of cloud-based sales performance management (SPM) software, is happy to announce its second-annual C.A.R.E. Week as part of its XactlyOne philanthropic foundation efforts. The event kicked off on Monday and will continue throughout the week, with each day focusing on a ...

    SOURCE
    READ MORE

    /news-article.aspx?ID=69146914

    CYBERSECURITY LEADERS FACE CHALLENGES WITH CYBER TRANSFORMATION

    Aug 06, 2019

    CSOs and CIOs ranked cybersecurity transformation as one of the most challenging aspects of cyber risk management that are related to the entire infrastructure. According to Deloitte's The Future of Cyber 2019 report, with finite budgets and resources, the ability to apply the level of cyber str...

    SECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=67836783

    PENTA SECURITY RELEASES FIN-TECH CRYPTO NODE SERVICE

    Aug 05, 2019

    Penta Security, a company acknowledged as the top cybersecurity vendor in Asia by Frost & Sullivan and the APAC market share leader in the WAF industry, web, IoT, and data security solutions, has released PALLET Node Service, which allows various cryptocurrency nodes to be managed in cloud envir...

    SECURITYBRIEF
    READ MORE

    /news-article.aspx?ID=67746774

    CYBER SECURITY: WHAT A DIFFERENCE THE BOARD MAKES

    Aug 05, 2019

    The cyber threat never stands still, it is always evolving and will always be with us. If your business has not experienced a cyber-attack in the past year, you are in the minority. It is easy for many to believe that they are below the criminals’ radar but, in truth, every business is a targe...

    ACCOUNTANCY AGE
    READ MORE

    /news-article.aspx?ID=67796779

    GIAC LAUNCHES NEW CYBER SECURITY CERTIFICATION FOR GIAC DEFENSIBLE SECURITY ARCHITECTURE

    Aug 05, 2019

    GIAC Certifications, known for providing the highest standard in cyber security certifications, has launched a new certification: GIAC Defensible Security Architecture (GDSA) . In today's world, everyone knows that cyber threats are on the rise – and that no organization is exempt from bei...

    YAHOO FINANCE
    READ MORE

    /news-article.aspx?ID=67806780

    REPORT FINDS HACKING OF INTERNET CONNECTED CARS BIG NATIONAL SECURITY THREAT

    Aug 04, 2019

    Top 10 2020 Cars Vulnerable To Fleet Wide Hacks Due To Online Connections.The nonprofit group Consumer Watchdog has issued a report, with the help of car industry technologists, that finds all the top 2020 cars have Internet connections to safety critical systems that leave them vulnerable to fleet ...

    AITHORITY
    READ MORE

    /news-article.aspx?ID=67756775

    BANKING MALWARE GROWS 50% WHILE CRYPTOMINERS DECLINE – CHECK POINT

    Aug 01, 2019

    Check Point has released its Cyber Attack Trends: 2019 Mid-Year Report, revealing that no environment is immune to cyber-attacks. Threat actors continue to develop new toolsets and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third...

    SECURITYBRIEF
    READ MORE

    /news-article.aspx?ID=67676767

    TRINITY CYBER OBTAINS MILLIONS IN FUNDS FOR A NEW CYBERSECURITY APPROACH

    Aug 01, 2019

    Trinity Cyber, a Bowie, Maryland-based cybersecurity services and solutions startup, has announced the completion of a $23 million funding round led by Intel Capital and other top institutional investors. The company claims that it is taking an entirely new approach to cybersecurity and, with the he...

    VOIP
    READ MORE

    /news-article.aspx?ID=67716771

    VULNERABILITY MANAGEMENT: REDUCING THE REMEDIATION GAP

    Aug 01, 2019

    It’s maddening. Security professionals are often fully aware of the vulnerabilities that lead to breaches in their systems. The challenge is remediation. It’s hard, sometimes impossible, for security teams and their partners in IT operations to keep up. Reducing the remediation gap is cr...

    CYBER DEFENSE MAGAZINE
    READ MORE

    /news-article.aspx?ID=67726772

    A NEW ANDROID RANSOMWARE IS INFECTING SMARTPHONES THROUGH SMS MESSAGES

    Jul 31, 2019

    Do you own an Android smartphone? If yes, take a moment to stop and read this as security researchers have discovered a new ransomware that specifically targets Android smartphones and spreads over to other devices using an SMS containing an malicious code. Security researchers from cyber security f...

    INDIA TODAY
    READ MORE

    /news-article.aspx?ID=67686768

    PAYTHINK THE CROOKS WILL WIN UNLESS CYBERSECURITY IS FOUGHT ON MULTIPLE FRONTS

    Jul 30, 2019

    Protecting assets against cybersecurity is a daunting task, much akin to putting a finger in the hole of a dike. While the Equifax breach and subsequent fines highlight the importance of putting common sense over dollars, no one should be fooled by the sheer effort required to protect data, customer...

    PAYMENTSSOURCE
    READ MORE

    /news-article.aspx?ID=67596759

    LOUISIANA DECLARES STATE OF EMERGENCY DUE TO RANSOMWARE ATTACK

    Jul 30, 2019

    John Bel Edwards, Governor of Louisiana, has issued a state of emergency after a wave of ransomware attacks hits school districts. According to an official statement, the incident affected school systems in Sabine, Morehouse, and Ouachita parishes in North Louisiana. The attack infected the school&r...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=67636763

    EXPERT URGES COMPANIES TO START TAKING CYBERSECURITY MORE SERIOUSLY

    Jul 30, 2019

    The recent personal information data breaches, such the Capital One breach announced this week, show that companies are not taking cybersecurity seriously, expert Mourad Debbabi says. The provider of Costco Wholesale and Hudson’s Bay credit cards announced on Monday there was a breach of secur...

    MONTREAL GAZETTE
    READ MORE

    /news-article.aspx?ID=67646764

    NSA LAUNCHES NEW CYBERSECURITY DIRECTORATE TO DEFEND FROM FOREIGN ADVERSARIES

    Jul 29, 2019

    The National Security Agency (NSA), the intelligence agency of the United States Department of Defense, recently announced the launch of a new division intended to protect the country’s intelligence and critical digital assets against foreign cyber threats. The newly established Directorate wi...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=67606760

    HACKERS ACCESS FILES OF US-BASED CYBER SECURITY FIRM

    Jul 28, 2019

    Using an email address and password mistakenly exposed on the Internet, a hacker gained access to the internal files of US-based cyber security company Comodo, bringing the credibility of the company under question. The credentials were found in a public GitHub repository owned by a Comodo software ...

    SIFY
    READ MORE

    /news-article.aspx?ID=67556755

    CYBER SECURITY EVENT WILL LOOK AT HOW FIRMS CAN PROTECT THEMSELVES FROM ONLINE ATTACKS

    Jul 28, 2019

    Leading experts in cyber security will be speaking at a seminar organised by TheBusinessDesk.com. With fines reaching record levels and new regulations in place firms need to more careful than ever before when it comes to protecting data. And we have organised a special event in partnership with law...

    THEBUSINESSDESK
    READ MORE

    /news-article.aspx?ID=67566756

    MOST SMBS HAVE NOT IDENTIFIED AND DOCUMENTED CYBERSECURITY THREATS

    Jul 25, 2019

    A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, according to ConnectWise. The risk assessments reveal that an alarming 69% of SMBs have not identified and documented cybersecurit...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=67506750

    ROCHE CONFIRMS CYBER-ATTACK FROM WINNTI MALWARE

    Jul 25, 2019

    Roche has confirmed that it experienced a cyber-attack, after being named in a German public radio report. The cyber-attack used malware known as Winnti and, according to experts, the hackers are tied to the Chinese government. Bayer was also targeted by Winnti attacks last year. The company has sta...

    EUROPEAN PHARMACEUTICAL REVIEW
    READ MORE

    /news-article.aspx?ID=67516751

    BIGTINCAN EXPANDS TECH MARKET PRESENCES WITH ACQUISITION OF VEELO INC.

    Jul 25, 2019

    Bigtincan (ASX:BTH), the leader in mobile, AI-powered sales enablement automation, today announced the acquisition of Veelo Inc., a pioneer in sales enablement, to expand Bigtincan’s presence and offerings in the technology market vertical. The combination of Bigtincan’s solution, design...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68636863

    CONNECTWISE FINDS WOEFUL CYBERSECURITY AT SMBS, INCLUDING MSP PARTNERS

    Jul 24, 2019

    Nearly half of SMBs don’t have a plan for what to do following a cyberattack and most haven’t even identified threats to their systems, according to a new risk assessment from MSP platform provider ConnectWise. The firm’s assessment of 1,000 SMBs – half of them MSPs -- found ...

    CRN
    READ MORE

    /news-article.aspx?ID=67476747

    2019 CONTENT MARKETING AWARD WINNERS & TOP FINALISTS REVEALED

    Jul 24, 2019

    The Content Marketing Institute (CMI) just announced the 85 category winners as well as the finalists for the top seven prizes in the prestigious 2019 Content Marketing Awards. The Content Marketing Awards, produced by the Content Marketing Institute, is the largest and longest-running international...

    SOURCE
    READ MORE

    /news-article.aspx?ID=67996799

    INDUSTRIAL CYBERSECURITY EMERGING AS THE FRONTLINE FOR CYBERATTACKS

    Jul 23, 2019

    In recent times, the number of cybersecurity-related incidents occurring around industrial systems and operational technology has been rising with well-publicized reports of malware and threat actors causing critical disruptions of systems. Industrial Cybersecurity is therefore emerging as the front...

    AITHORITY
    READ MORE

    /news-article.aspx?ID=67466746

    HUAWEI ENSURES CYBER SECURITY WITH A HUGE TRANSFORMATION

    Jul 22, 2019

    Huawei Technologies, the world’s largest telecom equipment maker, has taken a series of measures to ensure the security of its products stands up to international scrutiny, a senior executive has revealed. “All the things that were published by the United Kingdom’s Oversight Board ...

    ASIA TIMES
    READ MORE

    /news-article.aspx?ID=67396739

    NIAGARA NETWORKS AND L7 DEFENSE BRING ZERO TRUST SECURITY TO APIS

    Jul 22, 2019

    Niagara Networks, the Open Visibility Platform pioneer, and L7 Defense, a cutting-edge cyber security vendor, today announced that they have formed a partnership to bring Zero Trust security to API communication running across an organization's network. The L7 Defense application runs directly o...

    PRNEWSWIRE
    READ MORE

    /news-article.aspx?ID=67426742

    ARTIFICIAL INTELLIGENCE – IS IT AN ADVANTAGE OR THREAT TO YOUR COMPANY’S DATA SECURITY?

    Jul 22, 2019

    The banking and financial services sector in India has come a long way in adopting Artificial Intelligence (AI) and its application. AI not only helps in enhancing customer experience but also helps improve operational excellence. The ability to use AI at scale for financial services is enabling inn...

    MONEYCONTROL
    READ MORE

    /news-article.aspx?ID=67436743

    TECH NATION’S CYBER SECURITY COHORT: FORTIUM TECHNOLOGIES

    Jul 22, 2019

    Information Age has partnered with Tech Nation to help explore 20 of the UK’s leading cyber security scaleups. Tech Nation Cyber is the UK’s first national scaleup programme for the cyber security sector. It is aimed at ambitious tech companies ready for growth. In a series of 20 company...

    INFORMATION
    READ MORE

    /news-article.aspx?ID=67446744

    KASPERSKY OFFERS CYBERSECURITY TRAINING IN VIDEO GAME FORM

    Jul 19, 2019

    Security vendor Kaspersky has developed an interactive cybersecurity training offering aimed at IT managers and corporate managers, and made it available through its partners. Named Kaspersky Interactive Protection Simulation (KIPS), the product is a video game simulating how a company should respon...

    CRN
    READ MORE

    /news-article.aspx?ID=67346734

    SECURITY IS BIGGEST DIGITAL TRANSFORMATION CONCERN

    Jul 18, 2019

    Cybersecurity is viewed as the biggest single risk to digital transformation projects, but most organizations aren’t involving CISOs early enough in projects, according to new research from Nominet. The .uk registry and DNS security organization polled 274 CISOs, CIOs, CTOs and others with res...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=67356735

    HOW SECURITY ORCHESTRATION AND AUTOMATION MAKE BANKS CYBER RESILIENT

    Jul 18, 2019

    As hackers become savvier, it’s not enough for security systems to recognize a threat after networks and devices are compromised. Today, security systems must anticipate threats by taking a holistic view of the technology ecosystem — from the cloud to a freelancer’s company phone &...

    BIZTECH MAGAZINE
    READ MORE

    /news-article.aspx?ID=67366736

    HOUSE PASSES TWO BILLS AIMED AT IMPROVING CYBERSECURITY FOR SMALL BUSINESSES

    Jul 17, 2019

    Two pieces of legislation passed in the House of Representatives Monday seek to improve cybersecurity practices at the Small Business Administration and help small businesses across the country defend themselves against cyber threats. The SBA Cyber Awareness Act, spearheaded by Rep. Jason Crow (D-Co...

    SECURITY TODAY
    READ MORE

    /news-article.aspx?ID=67236723

    CYBERSECURITY RECOMMENDATIONS FOR HEALTHCARE THAT WON'T BREAK THE BANK

    Jul 17, 2019

    The key to implementing healthcare cybersecurity best practices is to start small, according to Erik Decker, chief security and privacy officer for University of Chicago Medicine. A federal task group of cybersecurity experts and leaders spent two years working with healthcare organizations to craft...

    TECHTARGET
    READ MORE

    /news-article.aspx?ID=67246724

    NEW MALWARE SAMPLES RESEMBLE STRONGPITY

    Jul 17, 2019

    Researchers have said with high confidence that the publicly reported adversary dubbed StrongPity has been engaged in an unreported and ongoing malware campaign, according to research from AT&T Alien Labs. Threat actors are using the new malware and infrastructure to control compromised machines...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=67296729

    75% OF SECURITY AWARENESS PROS ARE PART TIME

    Jul 17, 2019

    The 2019 Security Awareness Report published by SANS Security Awareness, a division of SANS Institute, found that across many organizations, there is an increased emphasis on the need for awareness and training programs. According to the report, more than 75% of those who are currently responsible f...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=67306730

    AUSTRALIAN GOVERNMENT LAUNCHES NEW CYBERSECURITY NODE

    Jul 17, 2019

    In a bid to drive cybersecurity innovation and harness cybersecurity talent in the region, the New South Wales government and AustCyber have jointly launched the NSW Cyber Security Innovation Node at the harbor city’s Joint Cyber Security Centre. Announced in 2018, the new information security...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=67316731

    AUTONOMOUS CARS: SAFETY OPPORTUNITY OR CYBERSECURITY THREAT?

    Jul 16, 2019

    It all started as science fiction, but the possibilities of autonomous cars gracing our roads are getting closer to reality by the day. Transport companies such as Uber and Tesla are already experimenting on cars that use computer operating systems to instruct their human drivers. Google’s dri...

    MACHINE DESIGN
    READ MORE

    /news-article.aspx?ID=67256725

    NEW CYBER-SECURITY COMPETITION FOR TERTIARY INSTITUTIONS LAUNCHED

    Jul 16, 2019

    A new cyber-security competition for students of tertiary institutions was launched on Tuesday (July 16) to encourage interest in the field, amid the dearth of talent in the field in Singapore and the mounting threat of online attacks. The Cyber Investigators' Challenge is a free one-day event, ...

    THE STRAITSTIMES
    READ MORE

    /news-article.aspx?ID=67126712

    NSW GOVERNMENT CYBER SECURITY POLICY COMPLIANCE CLOCK IS TICKING FOR AGENCIES

    Jul 16, 2019

    Unveiled late last year, the New South Wales Government’s new Cyber Security Policy is designed to improve the digital defences of all state government agencies. The problem, however, is that many remain confused about exactly what they need to do. Under the policy, agencies must provide a wri...

    CSO
    READ MORE

    /news-article.aspx?ID=67136713

    SECURING SPACE: KASPERSKY TO GIVE COSMONAUTS CYBERSECURITY TRAINING

    Jul 14, 2019

    Kaspersky is proud to announce its new partnership with the Gagarin Research and Test Cosmonaut Training Center – the location in Star City where cosmonauts from all over the world prepare to go to space. As part of this collaboration, the company will hold special training for cosmonauts, as ...

    AL BAWABA
    READ MORE

    /news-article.aspx?ID=67106710

    HEALTHCARE ORGANIZATIONS TOO CONFIDENT IN CYBERSECURITY

    Jul 12, 2019

    According to a survey of 100 healthcare professionals from hospitals to physician group practices, more than half of respondents are highly confident in the cybersecurity of their patient portals. The State of Patient Identity Management report, published by LexisNexis® Risk Solutions, revealed ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=67116711

    ATTACKS IN TURKEY USED EXCEL FORMULA INJECTION

    Jul 12, 2019

    Having tracked the activities of threat actors suspected of being involved in a large number of malicious spam attacks targeting organizations based in Turkey, Sophos researchers determined that the attackers flew under the radar using Excel formula injections to deliver the payload. “The thre...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=67096709

    INSIDE THE NIST TEAM WORKING TO MAKE CYBERSECURITY MORE USER-FRIENDLY

    Jul 11, 2019

    Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security decisions for which they are not equipped. This is the main reason why security needs to be usable and why the National I...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=67046704

    OPERATORS CANNOT TURN A BLIND EYE TO CYBER SECURITY

    Jul 11, 2019

    Whilst investigating a cyber incident onboard a ship the USCG found that the security risk presented by the shipboard network was well known among the crew before the incident. In its recent Marine Safety Alert 06-19, the United States Coast Guard (USCG) shares its findings from an investigation int...

    MARINE LINK
    READ MORE

    /news-article.aspx?ID=67056705

    WHY CANNABIS BUYERS ARE UNIQUELY VULNERABLE TO CYBER ATTACKS

    Jul 11, 2019

    Experts in the field of cyber security say North America’s emerging cannabis industry—and its customers—could be especially vulnerable to hacks and extortion. Cities like Baltimore, as well as the state of Georgia’s court system, and Lake City, Florida, have been the recent t...

    LEAFLY
    READ MORE

    /news-article.aspx?ID=67066706

    NINE WAYS CRYPTOS ARE BEEFING UP SECURITY

    Jul 11, 2019

    The bitcoin theft, from Taiwan-based Binance, was valued at around $40 million and part of a “large-scale security breach”, in which hackers used “a variety of techniques, including phishing, viruses and other attacks”, chief executive Changpeng Zhao said in a statement at th...

    RACONTEUR
    READ MORE

    /news-article.aspx?ID=66996699

    ARLINGTON INVESTIGATING CYBER ATTACK ON COUNTY PAYROLL SYSTEM

    Jul 10, 2019

    Arlington County has revealed a cyber attack that penetrated the county’s payroll system. In a statement, the county says a number of employees were impacted by the intrusion, but did not specify the exact number or impacts. The intrusion appears to be the result of a “phishing” em...

    ARLNOW
    READ MORE

    /news-article.aspx?ID=67006700

    THIRD-PARTY RISK, BUG SUBMISSIONS UP FOR HEALTHCARE

    Jul 10, 2019

    Healthcare providers are finding it increasingly more difficult to assess and understand the risks posed by vendors, according to a new report released today by Censinet and the Ponemon Institute. The report, The Economic Impact of Third-Party Risk Management in Healthcare, surveyed 554 healthcare I...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66986698

    LIONBRIDGE WINS EMPLOYEE ENGAGEMENT AWARD FROM THE CONFERENCE BOARD

    Jul 10, 2019

    Lionbridge, the world's most trusted global communications platform, is pleased to announce that it has won the Technology division award for Employee Engagement in the Conference Board's Excellence in Marketing & Communications Awards Program. This prestigious program honors organizatio...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68156815

    CYBER ATTACKS BIGGEST THREAT TO FINANCIAL SECTOR

    Jul 09, 2019

    Financial services organizations are suffering from an increased number of phishing attacks, according to a new report Mobile Security in the Financial Services, published by Wandera. Researchers analyzed 4.7 million events across the subset of devices over the 6-month period. For mobile alone, each...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66876687

    CYBERSECURITY’S WEAK POINT IS WORKERS’ EMAIL THREAT KNOWLEDGE

    Jul 09, 2019

    Employees in customer service and security industries have the worst cybersecurity email performance, with hospitality sector workers scoring the lowest in multiple categories, a new data security report has found. According to the report, released July 10 by California-based global online security ...

    COAST REPORTER
    READ MORE

    /news-article.aspx?ID=66886688

    PRO GLOBAL AND CSA LAUNCH CYBER AUDIT PRACTICE TO REDUCE INSURANCE EXPOSURE

    Jul 09, 2019

    Pro Global has launched Cyber Audit Practice in partnership with cyber security firm Cyber Security Associates (CSA) to mitigate the risk for the insurance sector, as news that British Airways faces a huge £183.39 million fine for breaching data protection law was revealed this week. The new p...

    INTELLIGENT INSURER
    READ MORE

    /news-article.aspx?ID=66896689

    THAILAND LEADS ASEAN INTO A SECURE DIGITAL FUTURE

    Jul 08, 2019

    Thailand’s Ministry of Foreign Affairs envisions ASEAN as ‘seamlessly connected’ and cybersecurity will contribute to that vision. As the chair country of ASEAN, Thailand aims to advance the community towards a future that includes a digital ASEAN. Based on that vision, Thailand ha...

    SECURITYBRIEF ASIA
    READ MORE

    /news-article.aspx?ID=66786678

    FORTINET HIGHLIGHTS RISE IN CYBER ATTACKS DESIGNED TO TARGET SCADA AND OTHER INDUSTRIAL CONTROL SYSTEMS

    Jul 08, 2019

    Fortinet has announced the findings of its 2019 Operational Technology Security Trends Report, analysing data gathered from millions of Fortinet devices to discern the state of cybersecurity for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). The analysis...

    CRN
    READ MORE

    /news-article.aspx?ID=66806680

    SOLVING THE CYBER SECURITY RIDDLE FOR WEALTH MANAGEMENT FIRMS

    Jul 08, 2019

    It seems sensible that the higher the value of an item, the better protected it will be.  Yet, when it comes to personal wealth management, this traditional logic does not always hold true. Why pretend you are a Nigerian Prince to thousands when you could enjoy a bigger jackpot by pretending to...

    BUSINESS MATTERS
    READ MORE

    /news-article.aspx?ID=66836683

    BIDDING FAREWELL TO OUTDATED CYBERSECURITY PRACTICES

    Jul 08, 2019

    The three pillars of cyber security protection which are identity, privilege and asset management – won’t ever lose importance. They have remained inalterable for the past few decades. However, other IT security suggestions have not been as deep seated, and have instead evolved to reflec...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=66846684

    HOW WE MADE CYBERSECURITY PROFESSIONALS GIVE AWAY THEIR DATA – AT A CYBERSECURITY EXPO

    Jul 08, 2019

    The UK’s National Cyber Security Centre recently released a list of the 100,000 most common passwords. To say I cringed would be an understatement. 23.2 million accounts are still using ‘123456’ as a password, with people’s names, favourite football teams and favourite bands ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=66856685

    HACKERS MAY GLEAN YOUR PASSWORD BY LISTENING TO HOW YOU TYPE ON YOUR PHONE

    Jul 07, 2019

    That’s the startling premise of a recent study by researchers at Cambridge University and Sweden’s Linköping University who were able to glean passwords by deciphering the sound waves generated by fingers tapping on smartphone touch screens. Malicious actors can decode what a person...

    THE DENVER POST
    READ MORE

    /news-article.aspx?ID=66796679

    33% OF UAE RESIDENTS WANT AI TO LOOK AFTER THEIR CYBERSECURITY

    Jul 04, 2019

    While this figure is significantly higher than the average across those EMEA countries surveyed – where 26% of respondents said they would prefer AI to manage their cybersecurity – it lagged behind a preference for humans to complete the same task, with 47% of respondents in the UAE sayi...

    AFRICAZINE
    READ MORE

    /news-article.aspx?ID=66696669

    DATA BREACHES – ARE ENTERPRISE CYBER DEFENCES FACING IN THE RIGHT DIRECTION?

    Jul 04, 2019

    The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data. ...

    CSO
    READ MORE

    /news-article.aspx?ID=66706670

    APAC EXPERTS WEIGH IN ON CYBER SECURITY TRENDS

    Jul 04, 2019

    Hardly a day goes by without yet another organisation falling prey to a cyber attack or data breach that has led to reputational and financial losses. an unprecedented attack on its public healthcare IT systems that compromised the personal data of about 160,000 patients. The attack followed similar...

    COMPUTER WEEKLY
    READ MORE

    /news-article.aspx?ID=66716671

    SECURITY AND PRIVACY KEY TO SMART BUILDINGS AND CITIES

    Jul 04, 2019

    Network video supplier Axis Communications has published a whitepaper that details the benefits and challenges for smart buildings and smart city management, and highlights a methodology to address associated security risks. The Smart buildings & smart cities security whitepaper, produced in ass...

    COMPUTERWEEKLY
    READ MORE

    /news-article.aspx?ID=66726672

    GLOBAL CYBER SECURITY MARKET OVERVIEW BY TOP COMPANIES & SEGMENTATION

    Jul 03, 2019

    The Global Cyber Security Market report has the best advice on the subject of the comprehensive market.” The report deals with end customers to comprehend ongoing industry trends, Cyber Security industry growth, strategies, threats, cost, overview, manufacturing, and foresight trends, trading,...

    TECHNOLOGY NEWS STORE
    READ MORE

    /news-article.aspx?ID=66656665

    CYBERSECURITY SHOULD BE HANDLED BY LAW ENFORCEMENT AND GOVERNMENT, REPORT

    Jul 03, 2019

    A quarter (25%) of survey respondents feel cybersecurity should be the responsibility of law enforcement, and 28% feel it is down to the government, according to a report by Palo Alto Networks.  The study, which surveyed over 10,000 respondents in EMEA and UAE, explored the attitudes towards ne...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66686668

    THOUSANDS LEFT VULNERABLE IN NEXUS REPOSITORY

    Jul 02, 2019

    A recent breach in Nexus Repository left many companies and government agencies vulnerable, as thousands of private artifacts were left unprotected, according to a July 2 blog post from researchers Daniel Shapira and Ariel Zelivansky, with Twistlock Labs. While this breach was swiftly rectified, Sha...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66636663

    NZ FINALLY UPDATES ITS CYBERSECURITY STRATEGY, SO WHERE'S AUSTRALIA'S?

    Jul 02, 2019

    The New Zealand government has made good on its 2018 promise to refresh its national cybersecurity strategy and action plan, at least in part. The Cyber Security Strategy 2019 was published on Tuesday, but it's a brief document. Five of its 17 pages are the covers, copyright notices, glossary, a...

    ZDNET
    READ MORE

    /news-article.aspx?ID=66646664

    INCREASING SECURITY BREACHES TO DRIVE INTRUSION PREVENTION MARKET: REPORT

    Jul 01, 2019

    The Intrusion Prevention System market is forecast to surpass $8.5 billion by 2025, after growing at a CAGR 13.7% during the forecast period 2019-2025, according to market research by IndustryARC. Increasing awareness among entities regarding cyber security and essential data protection practices ha...

    MONEYCONTROL
    READ MORE

    /news-article.aspx?ID=66586658

    LAWMAKERS SEEK IMPROVED CYBER SAFEGUARDS WITH IOT SECURITY BILL

    Jul 01, 2019

    With the explosion of IoT devices on the market, and an accompanying desire by the U.S. government to use those products to streamline operations and find efficiencies, a bi-partisan group of lawmakers is pushing a bill that would set minimum standards for built-in security on IoT devices that are t...

    CRN
    READ MORE

    /news-article.aspx?ID=66596659

    SMALL PROVIDERS STILL STRUGGLING WITH CYBERSECURITY, RISK MANAGEMENT

    Jul 01, 2019

    Small healthcare organizations are less likely to use cybersecurity policies than their larger counterparts, such as failing to hire a dedicated chief information security officer, according to a new report from CHIME and KLAS. Released on Friday, the white paper assesses the current state of health...

    HEALTH IT SECURITY
    READ MORE

    /news-article.aspx?ID=66606660

    A PEAK INTO SAFE-T’S ZERO TRUST ACCESS SOLUTION

    Jun 30, 2019

    Safe-T provides a secure application and file access solution with 1) An architecture that implements Zero Trust Access, 2) A proprietary secure access control channel that enables users granted appropriate permissions access to shared sensitive files and folders, and 3) User behavior analytics. Why...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=66556655

    NEW DRIDEX VARIANT EVADING TRADITIONAL ANTIVIRUS

    Jun 28, 2019

    Only 10 days after malware researcher Brad Duncan reported analysis on a new variant of Dridex that bypasses mitigation of application whitelisting techniques by disabling or blocking Windows Script Host, eSentire discovered a new infrastructure pointing to a similar Dridex variant. “Dridex ma...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66536653

    CHINA HACKED EIGHT MAJOR COMPUTER SERVICES FIRMS IN YEARS-LONG ATTACK

    Jun 27, 2019

    Hackers working for China's Ministry of State Security broke into networks of eight of the world's biggest technology service providers in an effort to steal commercial secrets from their clients, according to sources familiar with the attacks. Reuters today reported extensive new details ab...

    THE HANS INDIA
    READ MORE

    /news-article.aspx?ID=66456645

    ENISA REINFORCED AS EU CYBERSECURITY AGENCY TO STEER NEW ACT

    Jun 27, 2019

    The EU Cybersecurity Act (CSA) comes into force from today, establishing an EU framework for cybersecurity certification under a reinforced and rebranded ENISA. Originally proposed in 2017 as part of a wide-ranging set of measures to deal with cyber-attacks and to build strong cybersecurity in the E...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66486648

    TEACHING NEXT-GENERATION CYBERSECURITY IS NCSU PROFESSOR’S GOAL

    Jun 27, 2019

    In recent years, computer hardware has faced an ever-evolving variety of cyberattacks that aim to access privileged information or take over a system’s operations. Unfortunately, academia has had trouble keeping pace, offering few – if any – courses that prepare students to make us...

    WRAL TECHWIRE
    READ MORE

    /news-article.aspx?ID=66496649

    GULF CLASH & CYBER-ATTACKS, CONCERNS RISE FOR SECURITY IN US HOLY PLACES – BEYOND THE MATRIX

    Jun 27, 2019

    Rod Reuven Dovid Bryant and Jerry Gordon bring back Dr. Stephen Bryen to discuss the clash between the US and Iran over the downing in international waters of a US Navy MQ 4 Triton surveillance drone by Iranian air defense missiles. He questions the wisdom of disclosing the US retaliatory cyber-atta...

    THE JEWISH PRESS
    READ MORE

    /news-article.aspx?ID=66506650

    RECIPE FOR DISASTER AS TECH SUPPORT SCAMMERS USE PAID SEARCH

    Jun 26, 2019

    Tech support gangs have been spotted using paid search to reel in unsuspecting victims looking for food-related content online, according to Malwarebytes. The security vendor spotted scammers buying ads for Google and Bing which it said are designed to lure older netizens searching for food recipes....

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66436643

    STRINGENT CYBERSECURITY PROTOCOLS NEEDED TO PROTECT SMART CITIES

    Jun 26, 2019

    Smart cities across the UAE will be generating data at an unprecedented level, and this will necessitate stringent cybersecurity protocols being in place to protect valuable data, experts said. Highlighting the recent launch of the 'UAE National Cybersecurity Strategy', which will create saf...

    KHALEEJ TIMES
    READ MORE

    /news-article.aspx?ID=66446644

    XACTLY NAMED BAY AREA TOP WORKPLACE

    Jun 26, 2019

    Xactly, the leading innovator of cloud-based sales performance management (SPM) software, has been named a Top Workplace by the Bay Area News Group for the seventh time. The list is based on employee feedback gathered through a third-party survey administered by research partner Energage, LLC, a lea...

    SOURCE
    READ MORE

    /news-article.aspx?ID=69156915

    SOCIAL ENGINEERING FORUM SUFFERS MAJOR BREACH

    Jun 25, 2019

    An online forum focused on discussion of all things social engineering has been breached, with the details of tens of thousands of account holders compromised. Social Engineered administrator “Snow101” explained to users in a post late last week that the hackers exploited a vulnerability...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66386638

    3 CYBERSECURITY LESSONS FOR E-COMMERCE WEBSITE ADMINISTRATORS

    Jun 25, 2019

    In large part, the security of an ecommerce company is the responsibility of its technical support team and ecommerce software vendors. In reality, cybercriminals often exploit the security illiteracy of the staff to hit a company. Of all the ecommerce team, web administrators are often targeted for...

    PACKT
    READ MORE

    /news-article.aspx?ID=66396639

    THE SECRET TO ISRAELI CYBERSECURITY INNOVATION AT TAU’S CYBER WEEK

    Jun 25, 2019

    Cybersecurity experts came together yesterday for a plenary session at Tel Aviv University’s 10th annual Cyber Week, where they discussed best practices for innovative solutions in security workplaces. The panel, titled “The Formula for Cyber Innovation,” was moderated by Dr. Yeniv...

    THE JERUSALEM POST
    READ MORE

    /news-article.aspx?ID=66406640

    LEVEL 11 TECH ADVISER ROBERT WILLIAMS SHARES TIPS FOR ONLINE SECURITY

    Jun 25, 2019

    Robert Williams, the Chief Technology Adviser for Philippines-based digital and cyber-defence consultancy Level 11 Tech, has shared his tips on-line security basics. During a recent showcase event in Manila hosted by local IT services and consultancy Level 11 Tech, the firm’s Chief Technology ...

    CONSULTANCY.ASIA
    READ MORE

    /news-article.aspx?ID=66306630

    CYBERSECURITY FIRM TREND MICRO FINDS CRYPTO MALWARE ON ANDROID SOFTWARE

    Jun 24, 2019

    The “multinational cyber security and defense company” from Tokyo, Trend Micro, recently reported on a cryptocurrency mining bot that’s infecting Android devices, reports CoinDesk. Security threats are spread all over. According to Trend Micro, the malware is in 21 different countr...

    INSIDEBITCOINS
    READ MORE

    /news-article.aspx?ID=66266626

    INCOMPLETE FIX LEADS TO NEW KUBERNETES BUG

    Jun 24, 2019

    A new high-severity Kubernetes vulnerability has been discovered, according to security announcement on Securelists.org. As part of the ongoing Kubernetes security audit sponsored by the Cloud Native Computing Foundation, the Kubernetes product security team announced a new high-severity vulnerabili...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66286628

    MASSIVE DHS DATA BREACH RAISES QUESTIONS ABOUT OREGON’S CYBERSECURITY PROTOCOLS

    Jun 24, 2019

    A January data breach at the Department of Human Services exposed the confidential information of an eye-popping 645,000 Oregonians. Those people whose personal data was compromised were left with many questions. But the massive breach raised an even bigger question for everyone else: What are state...

    OREGONIAN
    READ MORE

    /news-article.aspx?ID=66296629

    OPTIV SECURITY CROWNED TOP PURE-PLAY SECURITY SOLUTIONS INTEGRATOR FOR THE THIRD YEAR IN A ROW

    Jun 23, 2019

    Optiv Security, a world class cybersecurity solutions integrator supplying end-to-end cybersecurity solutions, revealed that for the third consecutive year, it has been crowned as the top pure-play security solutions integrator on The Channel Company’s 2019 SP500. The SP500 is well-knownan yea...

    CLOUDWEDGE
    READ MORE

    /news-article.aspx?ID=66246624

    HOW IS DIGITAL TRANSFORMATION CHALLENGING THE SECURITY CHANGES?

    Jun 23, 2019

    Digital technologies are transforming the business world, and a larger number of companies have adopted the internet-of-things (IoT) devices to move their data into cloud environments for easier and safer access. The advent of these technologies has enabled firms to reimagine the traditional busines...

    ANALYTICS INSIGHT
    READ MORE

    /news-article.aspx?ID=66256625

    ARTIFICIAL INTELLIGENCE (AI) IN CYBER SECURITY MARKET PROSPECTS & GROWTH TRENDS RECORDED UNTIL 2026

    Jun 21, 2019

    Artificial intelligence (AI) is a result of a software that tries to create a decision mechanism similar to human brain’s decision mechanism. Artificial intelligence is playing a crucial role in cyber security by identifying threats and protecting organizations’ data from lethal cyber-at...

    THE WIRE NEWS NOW
    READ MORE

    /news-article.aspx?ID=66216621

    BOTNETS SHIFT FROM WINDOWS TOWARDS LINUX AND IOT PLATFORMS

    Jun 20, 2019

    Continuous monitoring and research of botnets discovered significant changes taking place in the coding of malware used to create bots, operations, and maintenance of botnets and IP Chain-Gangs. Throughout 2018, NSFOCUS developed profiles on 82 IP Chain-Gangs, groups of bots from multiple botnets ac...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=66166616

    CISOS STRUGGLING WITH 50+ SEPARATE SECURITY TOOLS

    Jun 20, 2019

    Organizations are struggling to gain real-time visibility into their security technologies and suffering from an excessive number of tools running across the enterprise, according to new research from Panaseer. The security monitoring firm polled 200 enterprise CISOs to better understand their key s...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66196619

    OPEN-SOURCE CYBERSECURITY TOOL TO ENHANCE GRID PROTECTION

    Jun 20, 2019

    A revolutionary new cybersecurity tool that can help protect the electric power grid has been released to the public on the code-hosting website GitHub. Developed by researchers at the U.S. Department of Energy’s (DOE) Idaho National Laboratory (INL), the Structured Threat Intelligence Graph (...

    T&D WORLD MAGAZINE
    READ MORE

    /news-article.aspx?ID=66206620

    SECURITY SHOULD BE BUSINESS FOCUSED, SAYS ISF

    Jun 19, 2019

    A security assurance program that focuses on business needs can help organizations meet the needs of business stakeholders, according to a new report released by Information Security Forum (ISF). The report, Establishing a Business-Focused Security Assurance Program, offers organizations ways to est...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66146614

    AMCA FILES FOR BANKRUPTCY PROTECTION AFTER BREACH

    Jun 19, 2019

    The parent company of healthcare debt collection firm American Medical Collection Agency (AMCA) has filed for bankruptcy protection following a major breach which is thought to have affected as many as 20 million patients. Its Chapter 11 filing in the Southern District of New York reveals the action...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66156615

    AGENCIES SEE GROWTH IN CONTENT MARKETING BUSINESS

    Jun 19, 2019

    Agencies are banking on content marketing. That’s the key finding in the newly released Content Marketing Institute 2019 Agency Survey. This inaugural research looks at how full-scope agencies, as well as specialized agencies, are doing content marketing for clients, how well it’s workin...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68006800

    ATOS REACHES 3RD POSITION WORLDWIDE IN MANAGED SECURITY SERVICES FOR THE CYBERSPACE ACCORDING TO GARTNER

    Jun 14, 2019

    Atos, a global leader in digital transformation, today announces it has been ranked the 3rd global player in Managed Security Services (MSS) in terms of 2018 market share revenue, according to the latest Gartner report1. With a global team of over 5,000 security specialists and a worldwide network o...

    GLOBENEWSWIRE
    READ MORE

    /news-article.aspx?ID=66116611

    CYBER-SMART STRATEGIES FOR SMART BUILDINGS

    Jun 13, 2019

    Buildings are rapidly embracing digitization, and while the convergence of smart technologies and physical environments has greatly improved business operations and overall capabilities, this digitized method of operating has, in certain respects, led to increased potential vulnerabilities and attac...

    FACILITY EXECUTIVE MAGAZINE
    READ MORE

    /news-article.aspx?ID=66096609

    CROWDSTRIKE IPO SUCCESS PUTS SPOTLIGHT ON ENDPOINT SECURITY

    Jun 13, 2019

    Cybersecurity firm CrowdStrike made its successful Wall Street debut Wednesday. The company closed its trading with a share price of $58. Endpoint security vendor CrowdStrike raised more than $600 million in its initial public offering Wednesday. CrowdStrike shares closed at approximately $58 per sh...

    TECHTARGET
    READ MORE

    /news-article.aspx?ID=66106610

    AVIATION CYBER SECURITY MARKET OUTLOOK SEGMENTATION, GROWTH AND COMPETITIVE LANDSCAPE

    Jun 13, 2019

    Latest Industry Research Report On “Aviation Cyber Security – Industry Pipeline Insight, 2019” in-depth analysis of the market state and also the competitive landscape globally. “Aviation Cyber Security – Industry Pipeline Insight, 2019” – report offers comp...

    TRUTH DAILY MIRROR
    READ MORE

    /news-article.aspx?ID=66056605

    XACTLY UNVEILS AI-POWERED SOLUTION TO DELIVER REAL-TIME DATA-DRIVEN INSIGHTS FOR SALES

    Jun 13, 2019

    Xactly, the leading innovator of cloud-based sales performance management (SPM) software, today announced a major enhancement of the company’s artificial intelligence (AI) capabilities across its core Sales Resource Planning & Capacity Management solution. This announcement follows the rel...

    SOURCE
    READ MORE

    /news-article.aspx?ID=69176917

    XSS IS MOST REWARDING BUG BOUNTY AS CSRF IS REVIVED

    Jun 12, 2019

    Cross-site scripting (XSS) is the most rewarding security vulnerability, according to data on the number of bug bounties paid. According to HackerOne’s top 10 most impactful security vulnerabilities, which have earned hackers over $54m in bounties and based on over 1400 HackerOne customer prog...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66066606

    CYBERSECURITY: NO LONGER JUST FOR REGULATED BUSINESSES

    Jun 12, 2019

    If you’re not already operating under some form of regulation, you soon will be. In fact, you probably are already, know it or not. But whether your business is highly regulated or not, your business is at risk and could benefit from taking a more security conscious approach. We all understand...

    ARKANSASBUSINESS
    READ MORE

    /news-article.aspx?ID=66006600

    CYBERSECURITY CO CYBER OBSERVER RAISES $8M

    Jun 12, 2019

    The Israeli company will use the funds to expand US operations and has established an office in Virginia. Israeli cybersecurity company Cyber Observer has raised $8 million in a Series B financing round led by Merlin International. The Caesarea-based company will use the funds to launch its North Am...

    GLOBES
    READ MORE

    /news-article.aspx?ID=66016601

    FLAW IN SYMCRYPT CAN TRIGGER DDOS

    Jun 12, 2019

    A vulnerability in the SymCrypt cryptographic library of Microsoft's OS can trigger a distributed denial-of-service (DDoS) disruption in Windows 8 servers and above, causing a perpetual operation "when calculating the modular inverse on specific bit patterns with bcryptprimitives!SymCryptFd...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=66046604

    SECURITIES COMMISSION CONDITIONALLY APPROVES LUNO AS RECOGNISED MARKET OPERATOR

    Jun 11, 2019

    It’s a long time coming, but Malaysian crypto exchange Luno Malaysia Sdn Bhd (“Luno”) is a step closer to becoming a Recognised Market Operator. In a blog post, Luno revealed that the Securities Commission (SC) of Malaysia has conditionally approved the company’s application ...

    VERNONCHAN
    READ MORE

    /news-article.aspx?ID=65966596

    CSPI LAUNCHES CYBERSECURITY SOLUTION TO ADDRESS COMMERCIAL IOT SECURITY RISKS

    Jun 11, 2019

    CSPi (NASDAQ: CSPi), a provider of cybersecurity and packet capture products, managed IT and professional services and technology solutions, today announces a new approach to addressing the unique security challenges found in commercial Internet of Things (IoT) devices, especially in the medical (Io...

    GLOBENEWSWIRE
    READ MORE

    /news-article.aspx?ID=65996599

    ENSURE YOUR BUSINESS HAS CYBER SECURITY PROTECTION ONLINE

    Jun 10, 2019

    ENSURE YOUR BUSINESS HAS CYBER SECURITY PROTECTION ONLINE. It doesn’t matter how big or small your business, or what industry you work in, data breaches pose a real threat to all of us. In addition to monetary fines, a data breach can result in long-term reputational damage, business disruptio...

    BQ LIVE
    READ MORE

    /news-article.aspx?ID=65916591

    YOUR LINUX CAN GET HACKED JUST BY OPENING A FILE IN VIM OR NEOVIM EDITOR

    Jun 10, 2019

    If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim. Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE...

    THE HACKER NEWS
    READ MORE

    /news-article.aspx?ID=65946594

    HACKERS CAN STEAL YOUR PASSWORDS, EMAILS, AND TEXTS BY LISTENING AS YOU TYPE ON YOUR SMARTPHONE

    Jun 10, 2019

    Hackers may be able to read whatever you type on a smartphone – by listening in via the device’s microphone. When humans tap on a touchscreen, they generate sound waves that are often strong enough to be picked up by the same device’s nearby microphone/s. Because each particular ch...

    JOSEPH STEINBERG
    READ MORE

    /news-article.aspx?ID=65956595

    CHECK POINT PARTNERS WITH SINGAPORE POLYTECHNIC TO STRENGTHEN CYBERSECURITY SKILLS IN SINGAPORE

    Jun 10, 2019

    Check Point Software Technologies Ltd., a provider of cyber security solutions globally, today announced that it will provide a comprehensive cybersecurity curriculum to Singapore Polytechnic as part of the Check Point SecureAcademy™ education program worldwide. As Singapore continues to trans...

    BACK END NEWS
    READ MORE

    /news-article.aspx?ID=65896589

    NKITA HOSTS SESSION ON INCIDENT RESPONSE POLICIES FOLLOWING A CYBER SECURITY BREACH

    Jun 09, 2019

    Northern Kentucky International Trade & Affairs will host its next session on cybersecurity and incident response policies at C-Forward from 3:30 p.m. – 5:00 p.m. on Thursday, June 27. Frost Brown Todd attorney, Victoria Beckman, will present information about developing, implementing, and...

    NKYTRIBUNE
    READ MORE

    /news-article.aspx?ID=65906590

    COMMUNICATIONS IS A CRUCIAL ASPECT OF CRISIS MANAGEMENT AFTER A CYBER ATTACK

    Jun 07, 2019

    A carefully devised communication strategy is crucial to damage control following a cyber attack, according to Partner and Head of Brunswick South Africa’s Johannesburg office Marin Bidoli. Failure to manage communications in such a scenario only compounds the damage, she said at the ITWeb Sec...

    CONSULTANCY CO ZA
    READ MORE

    /news-article.aspx?ID=65866586

    SECURE STATE CYBER: THE IMPORTANCE OF ANTIVIRUS SOFTWARE AND CONTINGENCY PLANNING FOR VESSELS

    Jun 07, 2019

    The final article in our cyber risks series, produced in collaboration with Secure State Cyber, focuses on the benefits of antivirus software, the importance of contingency plans in the event of a cyber-attack and what actions Members can take to ensure good security practice on board their vessels....

    HELLENIC SHIPPING NEWS
    READ MORE

    /news-article.aspx?ID=66546654

    FIND OUT HOW THREAT HUNTING HELPS IN PROACTIVELY COUNTERING CYBER ATTACKS

    Jun 06, 2019

    Threat hunting isn’t new, but the importance of its practical use in countering cyberthreats is recent.  We’ve seen that companies’ awareness of threat hunting is increasing over time. However, a lack of attention given to cyberthreats, arising out of budget, expertise and sta...

    BUSINESSWORLD
    READ MORE

    /news-article.aspx?ID=65826582

    FIRMS FACE TARGETED BESPOKE CYBER ATTACKS, DARK WEB STUDY REVEALS

    Jun 06, 2019

    Academic study exposes prolific availability and demand for tailored malware, network access and corporate espionage services, which suggests many firms’ cyber defences are below standard. There has been a 20% rise in the number of dark net listings that have the potential to harm the enterpri...

    COMPUTER WEEKLY
    READ MORE

    /news-article.aspx?ID=65856585

    IDENTIFY AND PROTECT YOUR VERY ATTACKED PEOPLE

    Jun 05, 2019

    Identify and protect your “very attacked people” (VAP) as attackers look for high value targets. Speaking at Infosecurity Europe in London, Paul Down, senior director of Proofpoint said that when attackers look to get information or money, a year ago they would do a mass email campaign a...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65816581

    LEADING EUROPEAN ANALYST FIRM OVUM NAMES MADISON LOGIC A “LEADER” IN THEIR REPORT ON ACCOUNT BASED MARKETING

    Jun 05, 2019

    Madison Logic, the leading global account-based marketing (ABM) platform, today announced that Ovum, a market-leading data, research and consulting business headquartered in the U.K., named Madison Logic a “Leader” in the Ovum Market Radar: Account-Based Marketing report. Ovum recognized...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68436843

    CAR HACKING THREATENS VISION OF CONNECTED MOBILITY

    Jun 04, 2019

    When fraudsters targeted the Car2Go app-based vehicle-sharing service in Chicago in April, more than 70 vehicles were taken within a few hours. The vehicles were subsequently recovered, and it proved to be a case of fraudulent activity rather than a hack. Share Now, the joint venture between carmake...

    FT
    READ MORE

    /news-article.aspx?ID=65786578

    GLOBAL MOBILE SECURITY MARKET 2019-2028

    Jun 03, 2019

    The Global Mobile Security Market research report specifically captures the attention of different geographical regions such as Asia-Pacific, Latin America, Middle East, and Africa along with North America and Europe. Additionally, it brights up the present Mobile Security market scenario in company...

    THE CHEMICAL INDUSTRY
    READ MORE

    /news-article.aspx?ID=65736573

    LORCA ANNOUNCES ADDITIONS TO CYBERSECURITY PROGRAM

    Jun 03, 2019

    The London Office for Rapid Cybersecurity Advancement (LORCA) announced its third round of cybersecurity companies that will be joining its program to address the market need of industry today. The 15 "scaleups" responded to an open call and were invited to pitch their solutions to address...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65776577

    CYBERSECURITY MARKET 2019-2022 | TOP MANUFACTURES: SYMANTEC CORPORATION, PALO ALTO NETWORKS, FORTINET, FIREEYE, TREND MICRO INC., KPMG, IBM CORP

    May 31, 2019

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data centers and othe...

    MARKET REPORTS
    READ MORE

    /news-article.aspx?ID=65696569

    CHECKERS AND RALLY'S VICTIMS OF DATA BREACH

    May 31, 2019

    On Wednesday, Checkers Drive-In Restaurants alerted customers that it had been dealing with a data security issue involving "malware at certain locations." On its website, the restaurant group announced that after discovering the issue, it "engaged leading data security experts to con...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65726572

    GLOBAL CYBER SECURITY OF SECURITY SERVICES MARKET 2019 MOVEMENTS BY TREND ANALYSIS, GROWTH STATUS, REVENUE EXPECTATION TO 2025

    May 30, 2019

    Cyber Security of Security Services Market 2019 report focuses on the global Cyber Security of Security Services new technology, size, share, future forecast, growth opportunity, key market, and key players. The report provides complete coverage on major industry drivers, restraints, and their impac...

    JUSTICE NEWS HERALD
    READ MORE

    /news-article.aspx?ID=65656565

    WHY USER IDENTITY IS BECOMING THE NEW SECURITY PERIMETER

    May 30, 2019

    Digitalisation has many advantages, from increasing productivity to improving accessibility. However, every technology has its downside, and with digitalisation this comes in the form of increased organisational risk. So while we all benefit from being able to access networks from any location via a...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=65686568

    VISIBILITY, INTELLIGENCE AT THE HEART OF NEXT-GENERATION SECURITY

    May 29, 2019

    Cyber security experts say built-in intelligence and visibility are the hallmarks of the next generation cyber security technology. At the ITWeb Security Summit 2019 being hosted this week in Sandton, Johannesburg, a panel of experts led by Stefan van de Giessen, GM of cyber security, Networks Unlim...

    ITWEB
    READ MORE

    /news-article.aspx?ID=65616561

    ESET EXPOSES TURLA MALWARE ATTACKS ON EUROPEAN DIPLOMATS

    May 29, 2019

    Turla, an infamous advanced persistent threat (APT) group, is using new PowerShell-based tools that provide direct, in-memory loading and execution of malware, executables and libraries. Researchers at ESET detected several attacks against diplomatic entities in Eastern Europe using PowerShell scrip...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65646564

    27-YEAR-OLD SEARCH MARKETING CEO LANDS 13-STOP U.S. SPEAKING TOUR

    May 29, 2019

    Garrett Mehrguth, the CEO and co-founder of the B2B and enterprise search marketing agency, Directive, recently was selected to speak at 13 stops of the Digital Summit tour. Digital Summit, the largest conference series in the digital marketing industry, has invited Mehrguth to share his unique pres...

    SOURCE
    READ MORE

    /news-article.aspx?ID=66326632

    GERMANY SEEKS ACCESS TO ENCRYPTED MESSAGES ON WHATSAPP, TELEGRAM

    May 28, 2019

    Germany's federal interior minister, Horst Seehofer, wants companies such as WhatsApp and Telegram to give security authorities access to end-to-end encrypted messages or calls. Not complying with this could end with companies being banned by the Federal Network Agency. The latest issue of Der S...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65606560

    SEIZE THE CHANCE TO BOOST YOUR IT SECURITY SKILLS: SANS LONDON HAS PLENTY OF COURSES FOR YOU

    May 28, 2019

    Promo IT security training specialist SANS Institute is bringing a major event to London this summer, offering a bumper programme of intensive courses designed to arm security professionals with the skills they need to defend against database breaches and malicious attacks. Attendees have the chance...

    THE REGISTER
    READ MORE

    /news-article.aspx?ID=65556555

    AMID RISING CYBER THREATS, INDUSTRIAL FIRMS ARE DEPLOYING SECURITY STRATEGY AROUND IIOT: FROST & SULLIVAN

    May 27, 2019

    PRNewswire: The attacks on industrial systems and the industrial controls systems (ICS) architecture could range from physical impact, such as damage to the infrastructure, production downtime, loss of revenue, and hefty fines, to more severe consequences, such as injuries and even loss of life. In ...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=65566556

    CANVA UNDER CYBER-ATTACK, WITH REPORTEDLY AS MANY AS 139 MILLION USERS AFFECTED

    May 27, 2019

    In a statement on the Canva website, the startup said it had notified the relevant authorities. “At Canva, we are committed to protecting the data and privacy of all our users and believe in open, transparent communication that puts our communities’ needs first,” the statement said...

    BUSINESS INSIDER
    READ MORE

    /news-article.aspx?ID=65516551

    MOZILLA PATCHED 16 SECURITY FLAWS WITH THUNDERBIRD 60.7

    May 26, 2019

    Mozilla has rolled-out the latest release of their Thunderbird email client with numerous security fixes. This month’s update carries the biggest number of security fixes amongst all previous Thunderbird releases in 2019. Allegedly, Thunderbird 60.7 brings patches for 16 different security fla...

    LATEST HACKING NEWS
    READ MORE

    /news-article.aspx?ID=65526552

    CYBER SECURITY IN MANUFACTURING IS THE NEED OF THE HOUR, FEELS INDUSTRY

    May 23, 2019

    With digitalisation, Artificial Intelligence and smart working culture making inroads in various sectors, including manufacturing, Indian companies are also gearing up to cope with the problems that come along with the technological advancement. One such issue is of cyber security. There have been i...

    ELETS TECHNOMEDIA
    READ MORE

    /news-article.aspx?ID=65456545

    RANSOMWARE PROTECTION TIPS INCLUDE OFFLINE STORAGE, USER EDUCATION

    May 23, 2019

    Ransomware resilience continues to be important because the problem isn't going away. Explore these backup and education tips to help stay out in front of the issue. "It's always there." Jeff Martinson, IT director at Ameritas, is talking about ransomware. The problem may quiet dow...

    TECHTARGET
    READ MORE

    /news-article.aspx?ID=65466546

    6SENSE LAUNCHES ACCOUNT-BASED EXTERNAL MEDIA CAMPAIGNS ANALYTICS

    May 23, 2019

    Today 6sense, a leading Account Based Orchestration Platform, powered by AI, announced its External Media Campaigns feature. This capability extends 6sense's ability to track digital media campaigns launched on non-6sense platforms for use in account segmentation within the 6sense platform, and ...

    SOURCE
    READ MORE

    /news-article.aspx?ID=67166716

    6SENSE LAUNCHES ACCOUNT-BASED EXTERNAL MEDIA CAMPAIGNS ANALYTICS

    May 23, 2019

    Today 6sense, a leading Account Based Orchestration Platform, powered by AI, announced its External Media Campaigns feature. This capability extends 6sense's ability to track digital media campaigns launched on non-6sense platforms for use in account segmentation within the 6sense platform, and ...

    SOURCE
    READ MORE

    /news-article.aspx?ID=67176717

    FIRMWARE VULNERABILITY IN MITSUBISHI ELECTRIC

    May 22, 2019

    A vulnerability in Mitsubishi Electric’s MELSEC-Q Series Ethernet Module could allow a remote attacker to gain escalated privileges, according to an ICS-CERT advisory. Reported by Nozomi Networks, the vulnerability “could allow an attacker to render the PLCs statue in fault mode, requiri...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65436543

    GOOGLE STORED PLAINTEXT PASSWORDS SINCE 2005

    May 22, 2019

    Google has admitted that some of its enterprise customers’ passwords have been erroneously stored in plaintext, in a security issue dating back 14 years. The tech giant’s VP of engineering, Suzanne Frey, explained that the problem occurred when it introduced a new way for G Suite domain ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65446544

    PHISHING KIT 16SHOP TARGETS APPLE USERS, HACKERS

    May 21, 2019

    Researchers have discovered a hidden backdoor in a commercial phishing kit, 16Shop, used to attack Apple customers, according to Akamai. “When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65376537

    LIB DEMS COME FIRST IN UK FOR CYBERSECURITY

    May 21, 2019

    Sweden’s political parties have the best cybersecurity posture globally, with the UK languishing in the bottom half of the table, according to a new analysis by SecurityScorecard ahead of the European Parliament elections. Noting the impact of a major data breach at the Democratic National Com...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65386538

    IT’S ALL ABOUT THE LOGS – LOOKING INTO YOUR PAST WILL PROTECT YOUR NETWORK’S FUTURE

    May 20, 2019

    We see it repeatedly. The newly installed CISO or CIO installs the latest blinky-box in “the quadrant.” As they discuss all the great features and how it’s going to help protect their network, it’s discovered that while the device will get MOST of the logs, but there are stil...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=65296529

    NEW VERIZON DATA BREACH REPORT OUTLINES CHANGING CYBER THREAT LANDSCAPE

    May 20, 2019

    The new 2019 Verizon Data Breach Investigation Report (DBIR) provides a wealth of data and statistical research about where new cyber threats are coming from in the world, and how cyber criminals are altering their tactics in response to new defensive measures in place. The 12th annual Verizon data ...

    CPO MAGAZINE
    READ MORE

    /news-article.aspx?ID=65306530

    SINGAPORE GOVERNMENT LAUNCHES NEW CYBERSECURITY CENTER

    May 20, 2019

    The Maritime and Port Authority (MPA) of Singapore recently announced the launch of its new 24/7 cybersecurity center, Maritime Cybersecurity Operations Center (MSOC). Inaugurated by Niam Chiang Meng, the Chairman of the Maritime and Port Authority of Singapore (MPA), the new center is operated by S...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=65326532

    BLOCKCHAIN, CRYPTOCURRENCY’S FUTURE DEBATED AT CONSENSUS CONFERENCE

    May 18, 2019

    If you are still confused about what blockchain is and what it can be used for, don’t worry. The crypto industry is still trying to figure that out, too. Here at Coindesk’s Consensus 2019 conference, fledgling software companies pitched new pieces for future incarnations of blockchain, w...

    EWEEK
    READ MORE

    /news-article.aspx?ID=65216521

    BIOMETRIC TECHNOLOGY INDUSTRY: TREND OF INNOVATION ARRIVES, IMPLEMENTATION FOR NATIONAL SECURITY GAINS IMPORTANCE

    May 17, 2019

    Advances in biometric technology have transformed the conventional ways of identification and verification. Innovation has become a prime focal point for reducing the efforts of people with new ways for verification and ensuring the security. From voice biometric technology used for telephone bankin...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=65236523

    MORE ORGS USE BOOBY TRAPS FOR COUNTERINTELLIGENCE

    May 17, 2019

    A recent survey found that to gain counterintelligence the vast majority of organizations would allow an attacker to take decoy files rather than stop an attack in progress, according to the latest International Cyber Benchmark Index from the Neustar International Security Council (NISC). A reported...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65206520

    NORWEGIAN INDUSTRY AND STATE MUST COMBINE TO COUNTER CYBER THREATS

    May 16, 2019

    Norway has been targeted by two large ransomware attacks in recent months – and public and private organisations must react in a coordinated way. Norway’s leading private and publicly owned companies are deepening their collaborative cyber defence relationship with national security agen...

    COMPUTER WEEKLY
    READ MORE

    /news-article.aspx?ID=65136513

    GROWING OPPORTUNITIES MAKE CYBERSECURITY A KEY FOCUS AREA FOR IT MAJORS

    May 16, 2019

    Cybersecurity may have always been a major risk managed on priority by IT majors, but growing opportunities in the space lately have led companies to sit up and take notice. Leading IT companies such as Infosys, TCS, Wipro and HCL Technologies have begun investing significantly in cybersecurity segm...

    MONEYCONTROL
    READ MORE

    /news-article.aspx?ID=65146514

    EXTREME NETWORKS’ APPROACH TO AUTONOMOUS NETWORKING IS ELEMENTAL

    May 15, 2019

    This week at its ExtremeConnect user event in Nashville, Tenn., Extreme Networks played the tune of autonomous networks. The theme of the event was FutureForward, indicating that the customers in the audience should be looking at many of the upcoming technology and business trends to architect their...

    EWEEK
    READ MORE

    /news-article.aspx?ID=65066506

    IT DECISION-MAKERS WILLING TO SHARE THREAT INTEL

    May 15, 2019

    The sharing mentality is starting to take hold across the cybersecurity industry, with the vast majority of security decision-makers confessing that they would be willing to share threat intelligence, according to a new publication by IronNet. The report, Collective Offense Calls for Collective Defe...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65086508

    NEW PERFORMANCE BENCHMARK RANKS COMPANIES' CYBERSECURITY

    May 15, 2019

    Cyber Governance Indexes, a performance benchmarks software, provides market-based proof that companies with good cyber governance outperform peers in shareholder value terms – and vice versa. Five thousand companies are ranked at the beginning of each month from best to worst using real-world...

    SECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=65116511

    GIT ATTACK HIT WEAK CREDENTIALS

    May 14, 2019

    The git community is working to triage an apparent ransomware attack that hit user accounts on GitHub, GitLab, and Atlassian Bitbucket. The attack was initially discovered on May 2. Reports suggested that the attack targeted accounts with weak passwords. According to a blog post released today by th...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=65016501

    APAC FIRMS ON THE BACK FOOT IN CYBER SECURITY

    May 14, 2019

    Most Asia-Pacific organisations did not consider cyber security until after their digital transformation projects had begun, new survey finds In a worrying sign of complacency, more than 80% of Asia-Pacific organisations did not consider cyber security until after their digital transformation projec...

    COMPUTER WEEKLY
    READ MORE

    /news-article.aspx?ID=65026502

    CISCO ROUTERS OPEN TO MAJOR SECURITY FLAW

    May 14, 2019

    Cisco routers, including ones that can be found in malls, large companies or government institutions, are flawed in a way that allows hackers to steal all of the data flowing through them. The news was unveiled yesterday by Red Baron, a cybersecurity company whose researchers claim the Cisco 1001-X ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=65036503

    MICROSOFT SHAREPOINT VULNERABILITY EXPLOITED IN THE WILD

    May 13, 2019

    A critical vulnerability in Microsoft’s SharePoint collaboration platform has been exploited in the wild to deliver malware. The security hole, tracked as CVE-2019-0604, got its first patch in February and another one in March after the first fix turned out to be incomplete. Microsoft describe...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64906490

    WANNACRY REMAINS A GLOBAL THREAT TWO YEARS ON

    May 13, 2019

    WannaCry ransomware remains a global threat two years on from the initial outbreak of the attack in May 2017. That’s according to new analysis from Malwarebytes, which discovered that a total of 4,826,682 WannaCry detections have been identified since the malware variant first wreaked havoc. A...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=64956495

    FORMJACKING: THE SECURITY NIGHTMARE CISOS NEED TO KNOW ABOUT

    May 13, 2019

    Ransomware hit the headlines in 2017, cryptojacking became notorious in 2018, so it may come as no surprise that a sophisticated new form of attack is making its mark in 2019. Staying ahead of trends and the security game, malicious actors have latched onto another high-return attack. Their latest w...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64966496

    HEALTHCARE IT PROS NOW CONFIDENT IN THEIR CYBER ATTACK RESPONSE ABILITY

    May 10, 2019

    Almost two years since the ransomware attack that brought the NHS (National Health Service) to a halt, healthcare IT professionals feel more confident in their ability to respond to a cyber-attack, according to new research from Infoblox. As healthcare providers continue to undertake digital transfo...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=64856485

    PHOTO APP DEVELOPS TOOL WITH USER IMAGES

    May 10, 2019

    Photo storage app Ever failed to get consent from users who uploaded millions of images to the service before it adopted the images as tools to train a commercial facial recognition system, according to NBC News. Without disclosing their use of the images to users of the app, Ever also reportedly of...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=64896489

    NORTHERN IRELAND GENERATING CYBER SECURITY KNOWLEDGE AND JOBS

    May 09, 2019

    Northern Ireland is establishing itself as an international hub of cyber security research and innovation, providing growing employment opportunities The cyber security industry in Northern Ireland provides employment for nearly 1,700 people and is on course to generate more than £70m in salar...

    COMPUTERWEEKLY
    READ MORE

    /news-article.aspx?ID=64836483

    DON'T NEGLECT YOUR CYBER HYGIENE: SIX STEPS TO KEEP INFORMATION SAFE

    May 09, 2019

    Just as you can't just show up to the dentist one time in your life and expect to prevent cavities forever, the same is true for cybersecurity. It should be a continuous process, not a one-time gap assessment or penetration test. Because new threats are emerging every day, businesses must contin...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64846484

    NATIONAL AWARENESS PLAN ON CYBER SECURITY, CYBER CRIME BY YEAR-END

    May 08, 2019

    A NATIONAL awareness plan on the management of cyber security and cyber crime will be launched at the end of this year, Deputy Prime Minister (DPM) Datuk Seri Dr Wan Azizah Wan Ismail said yesterday. She said the plan, which is being developed by the National Cyber Security Agency, is expected to be...

    THE MALAYSIAN RESERVE
    READ MORE

    /news-article.aspx?ID=64726472

    C-SUITE UNDER ATTACK AS MONEY AND DATA DRIVE BREACHES

    May 08, 2019

    State-sponsored attacks, cloud storage misconfiguration, ransomware and social threats targeting the C-suite all posed major risks to global organizations over the past 12 months, according to Verizon. The vendor’s newly released Data Breach Investigations Report 2019 comprises analysis of ove...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=64776477

    DATA BREACHES IN THE CLOUD ARE MAINLY THE FAULT OF EMPLOYEES

    May 08, 2019

    When businesses use cloud services to store and manage data, they generally expect those services to handle data security, as well. However, a new report from Kaspersky Lab argues that in most cases, it’s the business’ employees that are to blame for data breaches. The comoants latest re...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64786478

    CANADIAN TELCO EXPOSES UNENCRYPTED CARD DETAILS

    May 08, 2019

    Canadian telco giant Freedom Mobile has become the latest big-name brand whose security has been found wanting after researchers discovered an unprotected database exposing over five million customer records. A research team at vpnMentor claimed to have discovered the Elasticsearch database online o...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=64796479

    ETHICAL HACKERS: THE GOOD GUYS PROTECTING YOU BEFORE THE BAD GUYS STRIKEA

    May 08, 2019

    Ethical hackers are essentially the good individuals who put themselves in the shoes of a hacker to find out where an organisation’s vulnerability lies before shady elements strike Digital Transformation is a phenomenon that nearly every IT organisation that exists is onboard with it. When it ...

    DATAQUEST
    READ MORE

    /news-article.aspx?ID=64706470

    INTERSECTING MACHINE LEARNING AND CYBERSECURITY

    May 07, 2019

    The technologies for Cyber Security and Machine Learning intersect in many ways. The objectives of cyber security technologies are to detect cyber-attacks, to thwart them, and—in case stopping an attack is not possible—monitoring system activities to detect an on-going attack before dama...

    ADVANCED SCIENCE NEWS
    READ MORE

    /news-article.aspx?ID=64716471

    THE NATIONAL CYBER SECURITY ALLIANCE AND ITSPMAGAZINE ANNOUNCE PARTNERSHIP IN SUPPORT OF CYBERSECURE MY BUSINESS™

    May 07, 2019

    The National Cyber Security Alliance (NCSA) – a nonprofit, public-private partnership focused on helping businesses and consumers stay safer and more secure online – announced today a strategic partnership with ITSPmagazine. At the intersection of IT security and society, ITPSmagazine is...

    YAHOO FINANCE
    READ MORE

    /news-article.aspx?ID=64666466

    CYBERSECURITY DRIVES INTELLIGENCE AGENCIES IN FROM THE COLD

    May 06, 2019

    Intelligence agencies and cybersecurity: What a long, strange trip it's been. Flash back to 2000, when Richard C. Schaeffer, then the U.S. Defense Department's director of information assurance, showed up to Def Con to pitch the hacking community on government employment. "We've got...

    BANKINFOSECURITY
    READ MORE

    /news-article.aspx?ID=64646464

    MOZILLA RELEASES MAJOR SECURITY FIX FOR FIREFOX

    May 06, 2019

    Mozilla's latest patch for Firefox allows web extensions, themes, search engines and language packs to all be enabled again, the company confirmed over the weekend. In a short announcement, it said it wanted to get these bugs fixed before the start of the week. Initially, the problem was with th...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64656465

    MADISON LOGIC UNVEILS NEW DATA CLOUD TO ACCELERATE ABM FOR B2B ORGANIZATIONS GLOBALLY

    May 06, 2019

    Madison Logic, the leading global account-based marketing (ABM) platform, today announces the launch of the ML Data Cloud, powering cutting-edge ABM to accelerate your pipeline and convert your best accounts faster. With state-of-the-art architecture, rich data, and a robust data gateway, the ML Dat...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68446844

    RANSOMWARE: PREVENT YOUR COMPUTER FROM BEING INFECTED

    May 05, 2019

    The cities of Newark, Atlanta, and Sarasota have been hit. So have Cleveland's airport and San Francisco's transit authority. When the cyberattack targeted Leeds, Alabama, its mayor had no access to email, personnel files, or financial systems. This week on "60 Minutes," correspond...

    CBS NEWS
    READ MORE

    /news-article.aspx?ID=64606460

    CANONICAL SHARPENS FOCUS ON RED HAT, VMWARE; IPO PLANS REMAIN

    May 03, 2019

    Canonical this week moved to simplify its service offerings in an attempt to lower cost and attract more customers looking to jump into the open source game. The move also comes ahead of a planned initial public offering that could handsomely compensate the company’s staff. The move is under i...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=64586458

    JUNIPER PUSHES OPEN SOURCE PAST EXPERIMENTATION TO IMPLEMENTATION

    May 03, 2019

    Juniper Networks believes that open source is initiating where the broader software and networking industry is heading, Julius Francis, director of product management and marketing for cloud, security, and analytics at Juniper told SDxCentral at this week’s Open Infrastructure Summit. However,...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=64596459

    UK BUSINESSES NEED TO STEP UP THEIR PASSWORD MANAGEMENT GAME

    May 02, 2019

    Despite doing a lot to keep their organisations safe, IT leaders are still falling short due to bad password practices. A new report by OneLogin found that almost all organisations in the country have some form of cybersecurity guidelines or best practices, and many IT decision makers are confident ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64526452

    HPE OPENS NEW HQ, HIGHLIGHTS LAB RESEARCH ADVANCES

    May 02, 2019

    Hewlett-Packard Enterprise, the HP that produces enterprise IT systems but not printers, laptops or workstations, showed off its new headquarters here in the heart of Silicon Valley on April 30. The event included a media tour of its wide-ranging research facilities. Among other projects, the tech g...

    EWEEK
    READ MORE

    /news-article.aspx?ID=64536453

    SPLUNK EXTENDS POWER OF DATA TO ALL WITH NEW ENTERPRISE PRODUCTS

    May 02, 2019

    Splunk this week added two new products targeting non-technical workers that connect to its core enterprise data platform. One provides access to enterprise dashboards through a number of services, and the other is a data tool for business operations professionals to visualize certain processes. &ld...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=64546454

    IBM OPENS ITS AUSSIE MULTI-ZONE AVAILABILITY REGION FOR CLOUD

    Apr 29, 2019

    Connecting three data centres in Sydney. IBM Australia’s new cloud boss Eric Schnatterly says the company’s multi-zone availability region (MZR) for cloud is now live in Sydney. IBM announced plans to deploy an MZR in Australia last June. Schnatterly will use his address at the Gartner I...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=64306430

    THIRD-PARTY RISKS AND PHISHING ATTACKS ARE TOP OF BUSINESSES CONCERNS

    Apr 29, 2019

    Business leaders in the UK and the US are struggling to find the balance between cost and security, often making trades between business demands and security. This is according to a new report by Glasswall Solutions which says that almost three quarters (71 per cent) of respondents consider that thi...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64386438

    MOBILE VERSION OF CHROME VULNERABLE TO PHISHING ATTACKS

    Apr 29, 2019

    Researchers have detected a vulnerability in mobile version of Google's Chrome browser which can allow hackers to trick unsuspecting victims into thinking they are vising a legitimate website instead of a fake one. As you may imagine, if a person believes they are visiting their bank's websi...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64396439

    KASPERSKY LAB SURVEY FINDS CYBERSECURITY A TOP SOURCE OF STRESS FOR CONSUMERS IN NORTH AMERICA

    Apr 29, 2019

    Today, Kaspersky Lab released a new survey report, which revealed that 75% of people in the U.S. and Canada are stressed by the number of passwords they have to manage. The research also found that facing a cybersecurity incident is one of the most stressful situations modern consumers can face. Whe...

    BUSINESS WIRE
    READ MORE

    /news-article.aspx?ID=64406440

    HOW TO GET YOUR EMPLOYEES ON BOARD WITH CYBER SECURITY

    Apr 29, 2019

    Cyber attacks can put your company’s stability at risk as it usually targets the company computer systems. Having employees on board ensures you get all the assistance you can get in combating threats before they harm the system. Continuous training is one way of keeping all employees up to da...

    BANKING EXCHANGE
    READ MORE

    /news-article.aspx?ID=64416441

    CARBANAK MALWARE WAS RECORDING VIDEO OF VICTIMS' DESKTOPS

    Apr 26, 2019

    Researchers from FireEye spent hundreds of hours analyzing the Carbanak backdoor malware and its source code and were surprised by some of the features it contained. Following hundreds of hours analyzing the Carbanak malware and source code, security researchers found surprising features and complex...

    TECHTARGET
    READ MORE

    /news-article.aspx?ID=64426442

    QUALCOMM PATCHES MAJOR CHIP SECURITY FLAW

    Apr 26, 2019

    Qualcomm has patched a vulnerability in a few dozen chips which allowed hackers to steal sensitive information from the devices running them. The information included encryption keys and passwords, it was said. According to the announcement, the vulnerability which was given the name CVE-2018-11976 ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64316431

    CISCO FINDS SERIOUS FLAWS IN SIERRA WIRELESS AIRLINK DEVICES

    Apr 26, 2019

    Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. The security ho...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64326432

    NIST TOOL FINDS ERRORS IN COMPLEX SAFETY-CRITICAL SOFTWARE

    Apr 26, 2019

    The U.S. National Institute of Standards and Technology (NIST) this week announced that updates to its Automated Combinatorial Testing for Software (ACTS) research toolkit should help developers of complex safety-critical applications find potentially dangerous errors and make their software safer. ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64226422

    CYBERSECURITY IS IMPROVING, THOUGH RISK CONTINUES TO GROW

    Apr 26, 2019

    There is never a shortage of bad news when it comes to cybersecurity, with a seemingly endless stream of vulnerabilities and exploits. The 2019 Trustwave Global Security Report, released on April 25, has its' fair share of bad news as multiple types of attacks have grown and attackers have conti...

    EWEEK
    READ MORE

    /news-article.aspx?ID=64286428

    P2P FLAWS EXPOSE MILLIONS OF IOT DEVICES TO REMOTE ATTACKS

    Apr 26, 2019

    Vulnerabilities discovered by a researcher in a peer-to-peer (P2P) system named iLnkP2P expose millions of cameras and other Internet of Things (IoT) devices to remote attacks from the Internet, and no patches are available. Paul Marrapese, a California-based security engineer, discovered two seriou...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64296429

    CONNECTED DEVICES, LEGACY SYSTEMS LEAVE HOSPITALS WIDE OPEN TO CYBER ATTACK

    Apr 25, 2019

    The spread of Internet-connected medical devices, combined with insufficient access controls, has helped enable a rapidly growing attack surface that's highly vulnerable to cyber attack. WHY IT MATTERS Those were among the findings of a healthcare security report published by network detection s...

    HEALTHCARE IT NEWS
    READ MORE

    /news-article.aspx?ID=64206420

    UK COULD BE SET FOR A MAJOR CYBERSECURITY UPGRADE

    Apr 25, 2019

    Consumers are bad at protecting themselves from online threats and that's probably the main argument why such a responsibility shouldn't be theirs to bear in the first place. Consequently, the UK government is considering building a national cybersecurity defence system, which should incorpo...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64216421

    CYBERSECURITY AND IOT INDUSTRY FACING SKILL SHORTAGE LEADING TO DEVELOPMENT ISSUES

    Apr 25, 2019

    Businesses in the UK are going through a tough phase while finding the correct blend of cybersecurity and IoT skills, according to a report by Experis Industry Insider. The study examines the growth of IoT and how it is impacting the cybersecurity jobs market. As the industry professionals witnessin...

    ANALYTICS INSIGHT
    READ MORE

    /news-article.aspx?ID=64146414

    6SENSE EXPANDS INTEGRATION WITH HUBSPOT FOR HEIGHTENED ACCOUNT BASED ORCHESTRATION

    Apr 25, 2019

    6sense, a leading Account Based Orchestration Platform, powered by AI, announced $27 million in funding. The round was led by Industry Ventures and included participation from existing investors Bain Capital Ventures, Battery Ventures, Costanoa Ventures, Salesforce Ventures, and Venrock. “We b...

    SOURCE
    READ MORE

    /news-article.aspx?ID=67186718

    CYBER SECURITY READINESS STALLS AS ATTACKS INTENSIFY, FINDS INSURER HISCOX

    Apr 24, 2019

    Global cyber security has “stalled” despite a sharp rise in attacks and soaring costs from the fall out, according to the Hiscox Cyber Readiness Report 2019. This lull in progress on cyber security has happened as attacks “reach a new intensity”, with more than three out of f...

    INTELLIGENT INSURER
    READ MORE

    /news-article.aspx?ID=64156415

    SHADOWHAMMER ATTACK DIDN'T JUST HIT ASUS

    Apr 24, 2019

    The Operation ShadowHammer supply chain attack which affected Asus last month may have affected more victims, Kaspersky has said. Further investigation by the company's security researchers found that Asus wasn't the only company targeted. In fact, a total of six companies were infiltrated d...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64116411

    REPORT: A VULNERABLE ATTACK SURFACE EXISTS IN HEALTHCARE ENTERPRISE IT NETWORKS

    Apr 24, 2019

    Vectra, the leader in network threat detection and response, today announced that the proliferation of healthcare internet-of-things (IoT) devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable attack surface that can be ...

    IT NEWS ONLINE
    READ MORE

    /news-article.aspx?ID=64126412

    GOVERNMENT OFFICIALS TARGETED WITH TROJANIZED TEAMVIEWER

    Apr 24, 2019

    Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines. The attack started with a malicious XLSM document with malicious macros, which i...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64136413

    UNDERSERVED POPULATIONS UNAWARE OF CYBERSECURITY RISKS

    Apr 23, 2019

    Members of underserved populations are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. Partly as a result, they are also less likely to access vital online services, such as banking, health services, educational prog...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=63946394

    SCIENTISTS MAY HAVE IDENTIFIED A NEW WAY TO IMPROVE NETWORK SECURITY

    Apr 23, 2019

    With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it. Researchers at the U.S. Army Combat Capabilities Development Command’s Army Research Labora...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=63956395

    UK FIRMS BEING HIT WITH MORE CYBERATTACKS

    Apr 23, 2019

    Businesses are ill-prepared for cyberattacks, and unsurprisingly, this means a higher percentage of companies have experienced attacks compared to last year. This is according to a new report by insurers Hiscox which says that 55 per cent of UK companies faced an attack this year, up from 40 per cen...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64016401

    CARBANAK SOURCE CODE DISCOVERED ON VIRUSTOTAL

    Apr 23, 2019

    The source code of a backdoor associated with the prolific FIN7 threat actor has emerged on VirusTotal alongside builders and other tools from the group, FireEye security researchers reveal. Also referred to as Carbanak, or Anunak, the financially-motivated actor has been active since at least 2015,...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64026402

    BANKING TROJAN DRIVE-BY DOWNLOAD LEVERAGES TRUST IN GOOGLE SITES

    Apr 23, 2019

    Brazilian hackers have developed a drive-by download attack leveraging the inherent trust in the Google name. A banking trojan known as LoadPCBanker is deployed using the file cabinets template in Google sites as a delivery vehicle. The attacker first developed a website using Google Sites. He then ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=64036403

    EXPLOITS FOR ADOBE VULNERABILITIES SPIKED IN 2018

    Apr 23, 2019

    With Flash Player on way out, attackers are renewing their focus on Acrobat Reader, RiskSense found. Malware authors weaponized more Adobe software vulnerabilities in 2018 than any previous year while the actual number of newly disclosed security flaws in the company's products dropped significa...

    DARK READING
    READ MORE

    /news-article.aspx?ID=64046404

    CI SECURITY RAISES $9.6M TO HELP CUSTOMERS MANAGE CYBER THREATS

    Apr 23, 2019

    CI Security, a startup that provides its customers with cybersecurity software and expertise in detecting and responding to digital intrusions and threats, announced Monday it has raised $9.6 million in new funding. Seattle-based CI Security, which was previously known as Critical Informatics, says ...

    XCONOMY
    READ MORE

    /news-article.aspx?ID=64056405

    LEARN TO CURB CYBER SECURITY THREATS

    Apr 22, 2019

    RECENTLY, there have been many cyber security concerns involving scams and data breaches. It has become extremely vital to know how to protect your information more securely. This has prompted Asia Pacific University (APU) to address those concerns while demonstrating the university’s strength...

    THE STAR
    READ MORE

    /news-article.aspx?ID=63846384

    DATA SECURITY SOFTWARE MARKET 2018 SWOT ANALYSIS: KEY MANUFACTURER, GROWTH BY SIGNIFICANT CAGR BY 2023

    Apr 22, 2019

    The report elaborates the complete details covering product definition, product type, and application. The report covers useful details which are categorized based on Data Security Software production region, major players, and product type which will provide a simplified view of the Data Security S...

    APPWEBRADAR
    READ MORE

    /news-article.aspx?ID=63856385

    GOVERNMENT AND TELECOMS MEETING UP OVER GOOGLE'S NEW CHROME VERSION

    Apr 22, 2019

    So Google is allegedly working on an encrypted version of its popular internet browser Chrome, and this has raised eyebrows of more than one government agency and telecom operator in the UK. The news first broke out in The Times, which claims Google is building an encrypted version of Chrome. That w...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=63916391

    CLOUD SECURITY IMPROVING: RESULTS OF THE 2019 SANS STATE OF CLOUD SECURITY SURVEY

    Apr 22, 2019

    The state of cloud security is improving, albeit slowly, according to results of the 2019 SANS State of Cloud Security survey to be released by SANS Institute on May 1, 2019. "Organizations are continually evolving in their use of cloud services, looking to the cloud for procurement, management...

    IT NEWS ONLINE
    READ MORE

    /news-article.aspx?ID=63926392

    HEALTHCARE FIRM EMCARE SAYS 60,000 EMPLOYEES AND PATIENTS EXPOSED IN BREACH

    Apr 22, 2019

    Dallas, Texas-based firm EmCare Inc disclosed on Saturday that a number of employees' email accounts had been accessed, potentially exposing personal information of almost 60,000 people, including 31,000 patients. EmCare, part of Envision Healthcare, provides outsourced physician services to hos...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63936393

    BLOCKCHAIN PATENT GRANTED TO CYBERSECURITY COMPANY OWNED BY U.S. DEFENSE CONTRACTOR

    Apr 21, 2019

    Documents published by the United States Patent and Trademark Office (USPTO) on April 16 reveal that Texas-based cybersecurity company Forcepoint has been awarded a blockchain-related patent. Forcepoint is owned by U.S. defense contractor Raytheon and private equity firm Vista Equity Partners, and C...

    COINTELEGRAPH
    READ MORE

    /news-article.aspx?ID=63836383

    CISCO DISCLOSES CRITICAL SECURITY ALERTS FOR OS, ROUTERS

    Apr 19, 2019

    Cisco issued 31 security advisories and alerts over the past few days affecting, among other products, routers, operating systems, and LAN software. The vendor classified two as critical-impact vulnerabilities, six as high-impact, and 22 as medium. These new security alerts come about a month after ...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63826382

    ELECTORAL COMMISSION SPINS UP CYBER OPS CENTRE

    Apr 18, 2019

    Looks to ex-cyber spooks to protect electoral systems. With the date of next month’s federal ballot now set, the agency in charge of Australia’s electoral systems has switched on its new security operations centre to protect against external interference. The short-term SOC capability wa...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=63616361

    STATE-SPONSORED HACKERS USE SOPHISTICATED DNS HIJACKING IN ONGOING ATTACKS

    Apr 18, 2019

    With growing concern over DNS manipulation attacks, details on a new elite state-sponsored DNS hijacking campaign have been released. Called operation Sea Turtle, researchers believe that at least 40 different organizations across 13 countries have been compromised. Researchers at Cisco Talos discov...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63716371

    RUSSIAN HACKERS USE RATS TO TARGET FINANCIAL ENTITIES

    Apr 18, 2019

    A financially motivated threat actor believed to speak Russian has used remote access Trojans (RATs) in attacks on financial entities in the United States and worldwide, Israel-based security firm CyberInt reports. Tracked by the research community as TA505, the Russian threat group is known for the...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63726372

    AUTOMOTIVE CYBER SECURITY: GLOBAL MARKET INSIGHT REPORT 2019 TO 2027

    Apr 18, 2019

    The "Global Automotive Cyber Security Market Analysis & Trends - Industry Forecast to 2027" report has been added to ResearchAndMarkets.com's offering. The Global Automotive Cyber Security Market is poised to grow strong during the forecast period 2017 to 2027. Some of the prominen...

    PR NEWSWIRE
    READ MORE

    /news-article.aspx?ID=63736373

    WHY HP HAS TAKEN THE PC SECURITY LEAD

    Apr 18, 2019

    Hewlett-Packard Inc. has the world's leading security feature for personal computers at the moment. That was my conclusion based on this week’s announcement from the Innovation Summit in Barcelona (I was there) of updates to its market-leading Sure View and the announcement of Sure Sense. ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=63746374

    LINKEDIN DATA FOUND IN UNSECURED DATABASES

    Apr 18, 2019

    A security researcher identified eight unsecured databases that held "approximately 60 million records of LinkedIn user information." GDI Foundation, where the security researcher is from, is a nonprofit organization with a mission to "defend the free and open Internet by trying to ma...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=63756375

    CISCO TALOS SAYS A NATION STATE IS BEHIND SEA TURTLE DNS HIJACKING ATTACKS

    Apr 17, 2019

    Cisco Talos researchers say a nation state is likely behind a new cyberattack, dubbed Sea Turtle, that uses domain name system (DNS) hijacking to steal credentials and passwords for espionage. While Talos won’t attribute the attacks to one particular nation state, “given the complexity i...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63816381

    3 QUESTIONS TO ASK BEFORE PUTTING A HEALTHCARE APPLICATION IN THE CLOUD

    Apr 17, 2019

    Several years ago, many experts were indicating that by 2020 everything would be running in the cloud. The promises of economical on-demand computing and storage resources were appealing. Companies could look to reduce capital investments and begin to sunset expensive data centers by quickly spinnin...

    HEALTHCARE IT NEWS
    READ MORE

    /news-article.aspx?ID=63626362

    NATION-STATE ATTACKERS EXPLOITING DNS AT SCALE, CISCO REPORTS

    Apr 17, 2019

    Cisco Talos is warning of a new attacker group it has dubbed "Sea Turtle" that is exploiting DNS information at scale across large government agencies. According to the report which was released on April 17, the Sea Turtle attack has already compromised at least 40 different organizations,...

    EWEEK
    READ MORE

    /news-article.aspx?ID=63636363

    ORACLE RELEASES 297 FIXES IN APRIL 2019 CRITICAL PATCH UPDATE

    Apr 17, 2019

    Oracle this week announced the release of 297 new security fixes as part of its April 2019 Critical Patch Update (CPU), two-thirds of which are remotely exploitable without authentication. Fifty-three of the fixes patch critical vulnerabilities — with a CVSS score of above 9 — including ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63516351

    LIONBRIDGE AGAIN NAMED ONE OF AMERICA'S BEST EMPLOYERS BY FORBES

    Apr 17, 2019

    Lionbridge Technologies is proud to announce it has again been named one of America's Best Employers by Forbes, which also recognized Lionbridge as a Best Employer for Women in 2018. The 2019 list recognizes organizations across a variety of industries that employ more than 1,000 people in the U...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68146814

    6SENSE SECURES $27 MILLION TO ADVANCE BOLD VISION IN B2B AND ABM

    Apr 16, 2019

    6sense, a leading Account Based Orchestration Platform, powered by AI, announced $27 million in funding. The round was led by Industry Ventures and included participation from existing investors Bain Capital Ventures, Battery Ventures, Costanoa Ventures, Salesforce Ventures, and Venrock. “We b...

    SOURCE
    READ MORE

    /news-article.aspx?ID=67196719

    HOW BLACKBERRY HAS BECOME A CYBER-SECURITY PLAYER

    Apr 16, 2019

    BlackBerry is a very different company today than it was a decade ago, as the one-time mobile giant is now firmly positioning itself to be a global player in the cyber-security market. Among the new assets in the BlackBerry security portfolio is Cylance, which BlackBerry acquired in a $1.4 billion d...

    EWEEK
    READ MORE

    /news-article.aspx?ID=63526352

    CROSS-PLATFORM ROOTKIT AND SPYWARE HITS TARGETS WORLDWIDE

    Apr 16, 2019

    The Scranos rootkit-enabled spyware operation has expanded reach outside of China to hit targets worldwide, Bitdefender security researchers warn. Spreading via trojanized applications posing as cracked software or legitimate programs (such as e-book readers, video players, drivers, or anti-malware ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63536353

    HP AIMS TO SECURE ITS PC PORTFOLIO WITH SURE SENSE MALWARE BLOCKER

    Apr 16, 2019

    HP on Tuesday announced a bevy of PC updates and new features, as well as the formal release of HP Sure Sense, the company's new software that uses AI to prevent and block malware in near-real-time, including ransomware and previously unknown malware. HP says Sure Sense is different from other m...

    ZDNET
    READ MORE

    /news-article.aspx?ID=63546354

    F-SECURE REPORT HIGHLIGHTS THE WOEFUL STATE OF INSECURITY IN THE ENERGY INDUSTRY

    Apr 16, 2019

    It is the most important industry in the world. Energy. We need it. Without it, nothing works. Without the oil producers and refiners, there’s no petrol to fuel our cars. Without power plans and the supporting infrastructure, there’s no electricity to keep the lights on. Without natural ...

    TNW
    READ MORE

    /news-article.aspx?ID=63556355

    NATIONAL GROUP SEEKS POLICYMAKERS, INTERNET OF THINGS INDUSTRY LEADERS TO JOIN SECURITY ACTION COMMITTEE

    Apr 16, 2019

    The Canadian Multistakeholder Process to enhance Internet of Things (IoT) security has a game plan to secure Canada’s connected future and will form an action committee to put it in play on April 18 in Ottawa. In April 2018, the Internet Society and the Ministry of Innovation, Science, and Eco...

    BUSINESS WIRE
    READ MORE

    /news-article.aspx?ID=63646364

    INNOVATIONS IN ENDPOINT SECURITY, ARTIFICIAL INTELLIGENCE, MACHINE LEARNING- AND IOT-BASED SECURITY

    Apr 16, 2019

    This Cyber Security TechVision Opportunity Engine (TOE) provides a snapshot on emerging cyber security solutions powered by artificial intelligence, machine learning, IoT, and endpoint security innovations that help protect companies from threats, data breaches, phishing attacks and defend against m...

    BUSINESS WIRE
    READ MORE

    /news-article.aspx?ID=63656365

    EUROPEAN SOCIETY OF CARDIOLOGY PAPER CALLS FOR AN INTEGRATED APPROACH TO DIGITAL HEALTH

    Apr 15, 2019

    Patients, clinicians and technology vendors must work together to drive the adoption of digital health at the heart of national models and systems, researchers say. The potential of digital health to provide a comprehensive framework for the research, prevention and treatment of chronic disease is b...

    HEALTHCARE IT NEWS
    READ MORE

    /news-article.aspx?ID=63356335

    WIPRO HACKED, INTERNAL SYSTEMS USED TO ATTACK CUSTOMERS: REPORT

    Apr 15, 2019

    Wipro is currently investigating what appears to be a serious breach of its networks and systems, which are apparently being used to launch attacks on customers, forcing the outsourcing giant to build a private email service to replace compromised corporate system. First reported by United States se...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=63416341

    THREE WORDPRESS PLUGINS 0DAY VULNERABILITIES UNCOVERED, THOUSANDS COMPROMISED

    Apr 15, 2019

    The more moving parts a website has, the more potential vulnearbilities and entry points it may have, also. This is particularly true with WordPress, whose platform revolves, in good measure, around different plugins. Each plugin is a potential disaster waiting to happen, and the bigger the userbase...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=63426342

    MICROSOFT'S CLOUD EMAIL BREACH IS A CAUSE FOR CONCERN

    Apr 15, 2019

    Microsoft has admitted that it suffered a data breach involving its web-based email services including Outlook.com, MSN.com and Hotmail.com that lasted for three months before it was detected and remediated. Microsoft has not fully publicly disclosed how many customer accounts were impacted, and the...

    EWEEK
    READ MORE

    /news-article.aspx?ID=63436343

    HEALTHCARE CYBER SECURITY MARKET TO ACCRUE $12.46 BILLION, BY 2023

    Apr 15, 2019

    According to the report published by Allied Market Research, the global healthcare cyber security market garnered $5.21 billion in 2017 and is expected to accrue a sum of $12.46 billion by 2023, growing at a CAGR of 15.6% from 2017 to 2023. The report provides a thorough analysis of market size and ...

    GLOBENEWSWIRE
    READ MORE

    /news-article.aspx?ID=63446344

    FOUR ELEMENTS OF AN EFFECTIVE CYBERSECURITY PLATFORM FOR SMALL BUSINESS OWNERS

    Apr 15, 2019

    Has your small or midsize business finally decided to bite the bullet on cybersecurity preparedness by adopting software to protect the firm’s sensitive information? If so, the key task for you now is to determine whether these new cybersecurity protections are, in fact, working. After all, da...

    FORBES
    READ MORE

    /news-article.aspx?ID=63456345

    IBM: 77% OF ENTERPRISES DON’T HAVE A CYBERSECURITY INCIDENT RESPONSE PLAN

    Apr 12, 2019

    The majority of companies — 77% of respondents — don’t have a cybersecurity incident response plan applied across the enterprise, according to a study conducted by the Ponemon Institute and paid for by IBM. One of the primary reasons for this is the well-documented security skills ...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63316331

    VERSA RELEASES CLOUD-MANAGED SD-WAN BRANCH AND SECURITY

    Apr 12, 2019

    Versa Networks released a cloud-managed SD-WAN branch and security service designed for managed service providers and mid-market enterprises. Alongside the Versa Titan offering, it released Versa Cloud Services Gateway, a series of appliances that provide security and SD-WAN. In conversation at MWC ...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63326332

    MAJOR VULNERABILITIES FOUND IN NEW WI-FI STANDARD

    Apr 12, 2019

    The latest WPA3 WiFi security and authentication standard may be suffering from serious safety flaws of its own.  This is according to a group of researchers - Mathy Vanhoef and Eyal Ronen, who issued a report called “Dragonblood – A Security Analysis of WPA3’s SAE Handshake&r...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=63346334

    IOT SECURITY STARTUP ARMIS RAISES $65 MILLION SERIES C

    Apr 11, 2019

    IoT security startup Armis raised $65 million in Series C funding, bringing the company’s total to $112 million. Sequoia Capital led the round, with participation from Insight Venture Partners and Intermountain Ventures. Bain Capital Ventures, Red Dot Capital Partners, and Tenaya Capital also ...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63216321

    SECURITY COLLIDES WITH MULTI-MILLION DOLLAR SD-WAN MARKET

    Apr 11, 2019

    It shouldn’t come as a shock that the SD-WAN market is hot right now. It brought in $700 million in 2018 and is projected to hit $17 billion in 2025, according to Global Market Insights. IHS Markit recently found that during the fourth quarter of 2018, the SD-WAN market grew 26% from the previ...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63226322

    INVESTORS ARE BETTING EARLY ON CYBERSECURITY STARTUPS

    Apr 11, 2019

    In an increasingly digital world, startups, small businesses, and large corporations have at least one problem in common: ensuring the security of the data they store. We also know that security is top of mind for VCs, too—but likely more for the returns than the actual protection. According t...

    CRUNCHBASE
    READ MORE

    /news-article.aspx?ID=63246324

    NEW CYBER SECURITY TRAINING PLATFORM FROM BOXX INSURANCE TURNS YOUR EMPLOYEES INTO A HUMAN FIREWALL

    Apr 11, 2019

    Strong cyber security is often associated with anti-virus protection and expensive security technology. But the weakest link is not software or hardware, it's human beings. Recent evidence shows that employee behaviour—be it clicking on a malicious link, or poor password safety—is re...

    GLOBENEWSWIRE
    READ MORE

    /news-article.aspx?ID=63256325

    U.S. ATTRIBUTES NEW TROJAN TO NORTH KOREAN HACKERS

    Apr 11, 2019

    Notorious North Korean hackers are using a new Trojan in their attacks, the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned on Wednesday. Referred to as Lazarus, BlueNoroff, and Hidden Cobra and said to be backed by the North Korean government, th...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63306330

    SAP PATCHES HIGH SEVERITY FLAWS IN CRYSTAL REPORTS, NETWEAVER

    Apr 10, 2019

    SAP this week released 6 Security Notes as part of its April 2019 Security Patch Day, including two that address High severity flaws in Crystal Reports and NetWeaver. Tracked as CVE-2019-0285 (CVSS Base Score: 7.5), the vulnerability in Crystal Reports is an information disclosure issue that could p...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63236323

    SYSDIG UNIFIES SECURITY AND MONITORING FOR CONTAINERS, MICROSERVICES

    Apr 10, 2019

    Sysdig this week released version 2.0 of its cloud-native security and visibility platform. The update unifies the aspects of its platform for a more complete view of the health, performance, and risk levels of an enterprises’ cloud-native applications. “It starts with a simple fact &mda...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63116311

    CARS EXPOSED TO HACKER ATTACKS BY HARDCODED CREDENTIALS IN MYCAR APPS

    Apr 10, 2019

    Hardcoded admin credentials found in the MyCar Controls mobile applications could have been exploited to locate and gain physical access to a vehicle. A small aftermarket telematics unit from Montreal, Canada-based AutoMobility, MyCar provides users with a series of smartphone-controlled features fo...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=63126312

    VERIZON LAUNCHES PATCH FOR ROUTER VULNERABILITY

    Apr 10, 2019

    Out of all possible vulnerabilities the hardware we use on daily basis may have, the ones which allow hackers a full takeover of the device is probably the one which sounds most ominous. Well, one of these vulnerabilities, dubbed CVE-2019-3914, was discovered late last year in the Fios Quantum Gatew...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=63136313

    GOOGLE BOOSTS CLOUD SECURITY, TRANSPARENCY AND IDENTITY

    Apr 10, 2019

    The way Google sees it, one of the primary ways to grow cloud adoption is by increasing trust and security in the cloud. At its Google Next event on April 10, Google announced new and enhanced services that look to improve security in the cloud as well as provide better security and transparency of ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=63156315

    YOUR HOTEL CHECK-IN CONFIRMATION COULD BE PUTTING YOU AT RISK

    Apr 10, 2019

    When your hotel automatically emails you your booking information, there's a good chance that you're not the only person with access to those documents. Symantec, a security company, found flaws on hundreds of hotel websites, which were leaking sensitive information like names, phone numbers...

    CNET
    READ MORE

    /news-article.aspx?ID=63016301

    MICROSOFT WIDENS UK CLOUD REACH

    Apr 09, 2019

    Microsoft has announced new Azure Availability Zones in the UK, pushing its cloud service even further in the country and offering increased compute capacity. Announcing the news in a blog post, the company says this now increases its Azure regions by more than double in the UK, and its compute capa...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=63026302

    NEW GRAB-AND-GO STEALER IS MAKING WAVES

    Apr 09, 2019

    Researchers suspect that a new stealer malware dubbed Baldr, first detected in January, has incorporated three known threat actors, according to Malwarebytes. In today's blog post, researchers said that Baldr has earned positive reviews on Russian hacking forums for its use of three threat actor...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=63036303

    GOOGLE CLOUD MOVES INTO DATA CENTERS, AWS, AND MICROSOFT AZURE WITH ANTHOS

    Apr 09, 2019

    Google today moved into on-premises data centers and across clouds — including competitors Amazon Web Services (AWS) and Microsoft Azure — with Anthos, its hybrid-cloud platform. “If you are using multiple cloud environments, Anthos is the choice for you,” said Google CEO Sun...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=63046304

    NATIONAL CYBERSECURITY CENTER AND SPACE ISAC PARTNER TO BOOST CYBERSECURITY

    Apr 09, 2019

    The National cybersecurity solutions provider Kratos Defense & Security Solutions recently announced its partnership with the Space Information Sharing and Analysis Center (Space ISAC), which was unveiled at the 35th Space Symposium in Colorado Springs. Kratos is a technology-focused, mid-sized ...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=63056305

    TENABLE DISCLOSES VERIZON FIOS ROUTER VULNERABILITIES

    Apr 09, 2019

    Millions of homes across America have Verizon's Fios Quantum Gateway router as their primary conduit to the internet, and many of them could be at risk, according to new research from security firm Tenable. On April 9, Tenable publicly disclosed that it was able to find multiple vulnerabilities ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=63146314

    JUNIPER BETS ON THE ENTERPRISE WITH CLOUD-DELIVERED SD-WAN

    Apr 08, 2019

    Juniper today released a cloud-delivered version of its SD-WAN service to simplify adoption and operations. It also leverages the recent $405 million acquisition of Mist Systems, which closed last week, to add visibility into both wired and wireless via its Contrail Service Orchestration platform. P...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=62916291

    WORLD ECONOMIC FORUM RELEASES REPORT ABOUT BLOCKCHAIN CYBERSECURITY

    Apr 08, 2019

    The World Economic Forum (WEF) released a report about blockchain cybersecurity on April 5. The report points out that most data breaches do not result from the level of skill of the hackers, but instead happen because appropriate security measures often are not implemented. The WEF further claims t...

    COINTELEGRAPH
    READ MORE

    /news-article.aspx?ID=62926292

    SECURITY RESEARCHERS DISCOVER IOS VERSION OF EXODUS ANDROID SPYWARE

    Apr 08, 2019

    Security researchers have discovered the iOS counterpart of a dangerous Android spyware strain that was seen earlier this year on the official Google Play Store. The good news, according to security researchers from cyber-security firm Lookout, is that the iOS version is less sophisticated than the ...

    ZDNET
    READ MORE

    /news-article.aspx?ID=62936293

    90 PERCENT OF SINGAPORE BUSINESSES SUFFERED DATA BREACHES LAST YEAR: REPORT

    Apr 08, 2019

    A recent research stated that cyber-attacks are increased in the last 12 months, causing security breaches affecting 96 percent of organizations surveyed. According to the research report from endpoint security firm Carbon Black, 90 percent of the Singapore businesses have been breached in 2018. In ...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=62946294

    TELCO SYSTEMS OFFERS UCPE WITH VMWARE-VELOCLOUD SD-WAN

    Apr 08, 2019

    Telco Systems today announced that it will offer an open universal CPE (uCPE) pre-integrated with the VMware VeloCloud-based SD-WAN service. This new offering will allow service providers to deploy the VMware SD-WAN services on their hardware of choice. The offering is part of Telco Systems NFVTime ...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=62956295

    THIRD PARTIES LEAK DATA ON 540 MILLION FACEBOOK USERS

    Apr 04, 2019

    Over half a billion personal Facebook records have been publicly exposed to the internet by two third party app developers, according to researchers at UpGuard. The security company claimed in a blog post on Wednesday to have found the two datasets stored in Amazon S3 buckets, configured to allow pu...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62816281

    CONSUMERS ON BOARD WITH SECURING HEALTH RECORDS

    Apr 04, 2019

    As the healthcare industry continues to struggle with tightening up its cyber-defenses, consumers increasingly believe they play a role in securing their health information, according to a new report published by Morphisec. The 2019 Consumer Healthcare: Cybersecurity Threat Index asked more than 1,0...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62846284

    CYBER-ATTACK ON BAYER SHOWS NO SIGNS OF DATA THEFT

    Apr 04, 2019

    As accusations of nation-state attacks from the Chinese government are becoming more prevalent, Bayer, Germany’s largest drugmaker, announced that it has managed to contain what appears to have been a cyber-attack from China, according to Reuters. The attack, which was initially reported by Ge...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62856285

    A SPOT OF RANSOMWARE HITS ARIZONA'S TEA

    Apr 03, 2019

    Another ransomware attack has struck, but this time the massive attack on AriZona Beverages was targeted, as first reported by Tech Crunch. After more than 200 company-networked computers displayed the message “Your network was hacked and encrypted,” the company’s IT department had...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62826282

    UK ORGS, CHARITIES IMPROVING IN CYBERSECURITY

    Apr 03, 2019

    Businesses and charities are showing progress in defending against breaches and ensuring General Data Protection Regulation Compliance (GDPR), according to a new report published by the Department for Digital, Culture, Media and Sport. The Cyber Security Breaches Survey 2019 found that less than a t...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62836283

    HOW BLOCKCHAIN WILL ENABLE FASTER AND TRANSPARENT PAYMENTS

    Apr 02, 2019

    As more blockchain-based payment networks and fiat-backed digital currencies – including one from the largest U.S. bank – emerge, experts and analysts are predicting a humongous change for the financial services industry. "I think you're starting to see a growing consensus,"...

    THE ECONOMIC TIMES
    READ MORE

    /news-article.aspx?ID=62756275

    WHY MCAFEE IS INTEGRATING AI INTO NEXT GEN SECURITY

    Apr 01, 2019

    Machine Learning and Artificial Intelligence (AI) are often over-used terms in a modern cyber-security context, but that doesn't mean they aren't useful for helping organizations and vendors to improve. Among the many vendors that have embraced AI is McAfee, which is integrating different ca...

    EWEEK
    READ MORE

    /news-article.aspx?ID=62716271

    GOOGLE REVEALS HOW IT KEEPS THE PLAY STORE SECURE

    Apr 01, 2019

    Google's latest Year in Review report, in which it tackles all things Android, discloses more details aobut how the company is keeping its mobile ecosystem safe and secure for its users. This year, it proudly showcased figures which seem to suggest that users that only download apps through the ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62726272

    CLOUDFLARE 1.1.1.1 WITH WARP ACCELERATES INTERNET PRIVACY

    Apr 01, 2019

    Cloudflare announced its new 1.1.1.1 with Warp service on April 1, providing a new security service that looks to provide consumers with improved privacy and security for internet access. The new consumer service is likely a precursor to Cloudflare's entry into the multi-billion-dollar market fo...

    EWEEK
    READ MORE

    /news-article.aspx?ID=62736273

    MILLIONS OF CUSTOMERS' DATA ACCESSED IN SECOND TOYOTA HACK

    Apr 01, 2019

    Tokyo sales subsidiaries raided. Auto giant Toyota has apologized to customers after a large data breach at its Tokyo area sales network was discovered on March 21 Japanese time. Toyota said unauthorized network access to a server used by sales subsidiaries may have leaked up to 3.1 million pieces o...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=62746274

    PUBLIC SECTOR DATA SECURITY REVIEW COMMITTEE APPOINTED IN SINGAPORE

    Mar 31, 2019

    The Committee was appointed in light of a series of four data-related incidents which occurred to the Health Ministry in the past 10 months. Singapore Prime Minister Lee Hsien Loong recently announced the appointment of a Public Sector Data Security Review Committee to conduct a comprehensive review...

    HEALTHCARE IT NEWS
    READ MORE

    /news-article.aspx?ID=62636263

    ISURANCE COMPANIES IN THE US COLLABORATE TO OFFER CYBER-SECURITY RATINGS

    Mar 31, 2019

    In a collaborative effort, some of the world’s largest insurers have set out to create a consumer ratings service for the cyber-security industry. The initiative was launched last week in the US, led by Marsh & McLennan, and will attempt to score best products to reduce hacking risks and w...

    SC MAGAZINE UK
    READ MORE

    /news-article.aspx?ID=62656265

    WORLD BACKUP DAY 2019 – EXPERTS SHARE THEIR VIEWS ON WHY 2019 IS AN IMPORTANT YEAR FOR BACKUP

    Mar 29, 2019

    World Backup Day is a chance for organisations to pause and take stock of their data handling, and ensure they are following best practice. The day has been celebrated since 2011 to help raise awareness of the sheer impact data loss can have on organisations and people. The causes of these incidents...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62606260

    ONLY HALF OF BUSINESSES CAN PROPERLY DEFEND AGAINST CYBERATTACKS

    Mar 29, 2019

    There is a ‘visible gap’ between security measures EU businesses say they take, and the ones they actually do take, according to a new survey by security experts Kaspersky Lab. More than four in five (83 per cent) of IT decision makers across six EU countries say they take precautionary ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62616261

    RUSSIA THREATENS TO BLOCK POPULAR VPN SERVICES

    Mar 29, 2019

    Comms watchdog wants to prevent website access. Russia's communications watchdog threatened on Thursday to block access to popular VPN-services which allow users to gain access to websites which have been outlawed by Moscow. Russia has introduced tougher internet laws, requiring search engines t...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=62626262

    GOOGLE BOOSTS 2FA SECURITY PROCESS

    Mar 28, 2019

    Google just announced new updates for its 2-step verification tool for G Suite users. The company claims that for some mobile and desktop users this will come as an update, for others will come as a brand new feature, “available for some devices”. According to company blog posts, the upd...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62506250

    CISCO PATCHES BUGS GALORE, SAYS 2 ROUTERS STILL VULNERABLE TO ATTACKS

    Mar 28, 2019

    Cisco released a slew of software patches to fix bugs in its IOS XE operating system, but said two small business routers are still vulnerable to attacks. In all, Cisco issued 25 security alerts on Wednesday and Thursday. It rated 19 high severity and six medium. As of Thursday morning, Cisco didn&r...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=62516251

    DLA PIPER SET TO SUE INSURER OVER NOTPETYA CLAIM: REPORT

    Mar 28, 2019

    DLA Piper has become the latest big name to be denied a multimillion-dollar insurance claim following major losses caused by the NotPetya ‘ransomware’ campaign of 2017. The multi-national law firm is said to be launching a legal case against its insurer Hiscox for failing to pay out. How...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62526252

    DEFENDING THE DEFENDERS OF THE CYBER UNIVERSE: HOW TO MITIGATE STRESS IN CYBERSECURITY

    Mar 28, 2019

    Stress is meant to be good for us. Some say it helps us accomplish tasks more efficiently and is important for survival. Unfortunately, the modern lifestyle, likely shaped by the advent of technology, has caused the scale to tip heavily toward chronic stress. According to the American Psychological ...

    FORBES
    READ MORE

    /news-article.aspx?ID=62536253

    7 WAYS CLOUD COMPUTING IS SHAPING HEALTHCARE IN 2019

    Mar 28, 2019

    Envision a futuristic technology where you can simply enter your health concerns and symptoms into the system along with insurance details, get advice from a physician in real-time and electronically receive prescriptions, order medicines online with automated payment either by insurance company or ...

    THE ECONOMIC TIMES
    READ MORE

    /news-article.aspx?ID=62546254

    AUSTRALIANS HONOURED IN GOOGLE FACULTY RESEARCH AWARDS

    Mar 27, 2019

    Six researchers receive grants for world-class technical research. Australian researchers from three universities have stood out in this year’s Google Faculty Research Awards, a highly competitive international grants program that drew 910 proposals from more than 320 academic institutions. Si...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=62406240

    RSAC 2019 SHOWCASES ENTREPRENEURS SECURING OUR NEW WORLD

    Mar 27, 2019

    Earlier this month, the top cybersecurity startups traveled to the new and improved Moscone Center to battle it out at the RSA Security Conference’s "Shark Tank"-style competition. These eminent data scientists, cyber warriors and scrappy entrepreneurs delivered three-minute pitches ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=62426242

    AMERICAN CONSUMERS DISTRUST SOCIAL MEDIA PRIVACY CAPABILITIES

    Mar 27, 2019

    Cyber-crime has become an accepted part of life for many Americans, and most want to do more to protect their privacy, according to a new report from Symantec. The Norton LifeLock Cyber Safety Insights Report, was released on March 26, providing insight into consumer attitudes about the current stat...

    EWEEK
    READ MORE

    /news-article.aspx?ID=62436243

    EDGE COMPANIES LAUNCH OPEN RESEARCH GROUP, PUBLISH SECOND REPORT

    Mar 27, 2019

    The state of data at the edge is … there’s a ton of data being generated, it needs to be secured and managed, and that requires orchestration and automation. This, according to the first topic-specific edge report published by Vapor IO, Packet, and Seagate Technology. The free report fo...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=62446244

    FACEBOOK SAYS UP TO 111,813 AUSSIES IN LAST YEAR'S SECURITY BREACH

    Mar 27, 2019

    Out of 29 million users impacted worldwide. Facebook has revealed that a mass security breach of its systems last year “may have” affected the personal information of up 111,813 Australian users. In September last year, hackers exploited three linked bugs to steal name, contact and other...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=62266226

    KUBERNETES 1.14 ADDS WINDOWS AND STORAGE SUPPORT, IS LIGHT ON SECURITY

    Mar 26, 2019

    The Kubernetes project is looking to get past unlucky 13 with the latest release of the container orchestration platform. The new 1.14 release includes new support for Windows containers and storage options but is light on new security features that overshadowed the previous release. The update itse...

    SDNCENTR
    READ MORE

    /news-article.aspx?ID=62276227

    MOST SECURITY PROS ARE IMPACTED BY GEOPOLITICS

    Mar 26, 2019

    Two-thirds of cybersecurity professionals have been forced to change where and with whom they do business because of escalating concerns around nation state attacks, according to Tripwire. The security vendor polled 218 security professionals at the RSA Conference in San Francisco recently and found...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62286228

    INFOSEC19: SKILLS SHORTAGES ARE EXPOSING FIRMS TO CYBER RISK

    Mar 26, 2019

    Over half (52%) of IT and security professionals believe that cybersecurity skills shortages are putting their business at an increased risk of attack, according to a new poll from Infosecurity Europe. Now in its 24th year, Europe's leading cybersecurity show asked over 9700 of its Twitter follo...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=62296229

    OVER 10.5 BILLION MALWARE ATTACKS DETECTED IN 2018

    Mar 26, 2019

    The number of cyberattacks escalated last year to top 10.5bn incidents attacks, new research has found. According to a report by SonicWall based on intel harvested from more than a million sensors placed worldwide, says 10.52 billion malware attacks were registered in 2018, and that hackers are also...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62416241

    IGNORE THE SEC’S STRENGTHENED STANCE ON CYBERSECURITY AT YOUR OWN PERIL

    Mar 25, 2019

    With constantly changing technology, integrated core business processes, and connected devices now pervasive, the threat and impact of cyberattacks are higher than ever. Attackers—whether individuals or nation-states—are becoming more astute, putting pressure on companies to take immedia...

    BRINK
    READ MORE

    /news-article.aspx?ID=62136213

    ASUS USERS TARGETED IN LARGE SUPPLY CHAIN ATTACK

    Mar 25, 2019

    Users infected via software update utility. Kaspersky Lab researchers have uncovered a large-scale attack against ASUS users in which a software update utility was modified and used to distribute malware. The researchers said investigations into the attack - dubbed Operation ShadowHammer - are &ldqu...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=62206220

    LOCKERGOGA RANSOMWARE SUSPECTED IN TWO MORE ATTACKS

    Mar 25, 2019

    A pair of U.S. chemical manufacturing companies have reportedly been struck by the LockerGoga ransomware over the past month and continue to recover from the same cyberattack that took down part of Aluminum giant Norsk Hydro last week. The attacks against Hexion and Momentive started on March 12, ac...

    BANKINFOSECURITY
    READ MORE

    /news-article.aspx?ID=62216221

    MICROSOFT ISSUES THE UPDATE TO ANNOUNCE THE END OF WINDOWS 7 UPDATES

    Mar 25, 2019

    It’s not exactly the Windows Update to end all updates, but it’s close. Windows 7 machines that downloaded the most recent round of official updates got one that doesn’t do much beyond telling you to stop using Windows 7. The way it’s supposed to work is that computers runnin...

    EWEEK
    READ MORE

    /news-article.aspx?ID=62226222

    RBS CUSTOMERS PUT AT RISK BY FAULTY SECURITY SOFTWARE

    Mar 25, 2019

    Royal Bank of Scotland (RBS) wanted to give its business banking customers an extra layer of security, but ended up possibly exposing them to cyberthreats, reports have claimed. The bank recently started offering what it calls the Heimdal Thor Foresight Enterprise, which is designed to spot and stop...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62236223

    UK SMALL BUSINESSES HIT HARDEST BY CYBERATTACKS

    Mar 25, 2019

    UK businesses have suffered a dizzying number of cyberattacks in 2018, but most of them fell on the backs of small businesses. Two thirds of companies with 10 – 49 employees have suffered some form of cyberattack in the past year. That amounts to roughly 130,000 businesses. On average, such an...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62246224

    MONITORING CLOUD APP ACTIVITY FOR BETTER DATA SECURITY: FIVE KEY TIPS

    Mar 22, 2019

    Digitisation has dramatically changed how work gets done. Business-critical apps and data are a keystroke away, no matter where an employee is or what time it is. Perhaps it is this familiarity with data that makes employees feel so connected to it that, when they switch jobs, they often take some o...

    CLOUD COMPUTING NEWS
    READ MORE

    /news-article.aspx?ID=62256225

    REMOVABLE DEVICES COULD BE PUTTING BUSINESSES AT RISK

    Mar 22, 2019

    What good are best security practices and policies if your employees aren’t sticking to them? New research among UK workers are doing just that – not adhering to their own companies’ cybersecurity policies. The report was released by ESET and Kingston Digital, and is based on a pol...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=62116211

    FACEBOOK STORED MILLIONS OF USER PASSWORDS IN PLAIN TEXT

    Mar 22, 2019

    Hundreds of millions of users to be notified. Scandal-ridden social network giant Facebook has owned up to accidentally storing hundreds of millions of user passwords in clear text, but says they were not exposed externally. Facebook's vice president of engineering, security and privacy Pedro Ca...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=62126212

    PWN2OWN RESEARCHERS REVEAL ORACLE, VMWARE, APPLE ZERO-DAY EXPLOITS

    Mar 21, 2019

    The first day of the 2019 Pwn2Own hacking competition saw researchers awarded a total of $240,000 for demonstrating new zero-day exploits in Apple Safari, Oracle VirtualBox and VMware Workstation. Day in and day out, vendors do their best to keep their software patched and free from zero-day vulnera...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61966196

    PORTWORX BOOSTS CLOUD-NATIVE DATA SECURITY AND DISASTER RECOVERY

    Mar 20, 2019

    Portworx Enterprise 2.1 adds new capabilities to its cloud-native Kubernetes data management platform, improving resilience and security. Portworx announced the latest edition of its namesake cloud-native storage and data management platform on March 20, providing users with new security and disaste...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61976197

    HALF OF EU BUSINESSES ATTACKED IN LAST TWO YEARS

    Mar 20, 2019

    More than half of businesses in the EU have had their operations disrupted by cyberattacks in the past 24 months, highlighting the size of the problem organisations everywhere are facing. This is according to a new report by Kaspersky Lab, which says that some of the reasons why businesses are feeli...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61986198

    BEC GIFT CARD SCAMS GO MOBILE

    Mar 20, 2019

    Cyber-criminals are evolving their tactics with Business Email Compromise (BEC) attacks by transferring victims from email over to mobile communications channels early on in a scam, according to Agari. Researcher James Linton described how such an attack typically takes place, with the initial spoof...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=61996199

    FHIR, CLOUD, POP HEALTH AND SOCIAL DETERMINANTS SPARK NEW SECURITY CHALLENGES

    Mar 20, 2019

    With increasing buzz around population health and social determinants of health, those two forces are poised to change philosophies around care delivery and how a hospital or health system works to keep the surrounding community healthy. While that likely means good things for patients and outcomes,...

    HEALTHCARE IT NEWS
    READ MORE

    /news-article.aspx?ID=62106210

    SOFTNAS CLOUD VULNERABILITY COULD ALLOW HACKERS TO BYPASS AUTHENTICATION

    Mar 20, 2019

    A vulnerability in SoftNAS Cloud data storage platform could allows attackers to bypass authentication and gain access to a company’s web-admin interface without valid credentials. Security vendor Digital Defense disclosed the flaw in a blog post today, and said SoftNAS worked with its Vulnera...

    SDNCENTR
    READ MORE

    /news-article.aspx?ID=62146214

    KEY TRENDS FROM THE MOST EXPLOITED VULNERABILITIES

    Mar 20, 2019

    While the cyber-security threat landscape is generally thought to change from year to year, some things, as it turns out, remain unchanged. According to a report released March 19 from Recorded Future that analyzes the top vulnerabilities of the past year, one of the key trends is that the same vuln...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61956195

    TRENDS BEHIND ANTICIPATED $300+ BILLION CYBERSECURITY MARKET

    Mar 19, 2019

    Leading technology companies in the world have experienced and countered cyber-attacks since the advent of the internet, eventually leading to the inception of cybersecurity market. Today, cybercrimes are measured among the most active and loss inducing offences being witnessed globally, enveloping ...

    SMART ENERGY
    READ MORE

    /news-article.aspx?ID=61756175

    POST-QUANTUM CRYPTOGRAPHY BECOMING RELEVANT IN PRE-QUANTUM WORLD

    Mar 19, 2019

    Quantum computers will be able to instantly break the encryption of sensitive data protected by today's strongest security, warns Arvind Krishna, director of IBM Research. "Anyone that wants to make sure that their data is protected for longer than 10 years should move to alternate forms of...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61856185

    HALF OF ORGANISATIONS LACK ENOUGH SECURITY TALENT TO BE SECURE

    Mar 19, 2019

    Those thinking artificial intelligence (AI) will steal their jobs need not worry – the software is only filling the blanks, at the moment. And the blanks, at least when it comes to cybersecurity, are quite large. According to the latest Trend Micro figures, organisations worldwide are faced wi...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61866186

    MICROSOFT AZURE SENTINEL USES DATA ANALYTICS TO IMPROVE SECURITY

    Mar 19, 2019

    Giving a wider range of fresh cyber-attack threats and information to IT security workers 24/7 is the aim of a new Microsoft Azure security tool—Microsoft Azure Sentinel—that was just released by the company in preview mode. Built to streamline the collection of IT security information a...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61876187

    MOZILLA IMPROVES WEB BROWSER SECURITY IN FIREFOX 66 UPDATE

    Mar 19, 2019

    Mozilla released the Firefox 66 update on March 19, providing users of the open-source web browser with new features that enhance user experience and improve security. Among Firefox 66's new features is one that blocks websites from auto-playing sound, which can be an annoyance. Also, the search...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61886188

    ONLY 28% OF GOV.UK DOMAINS SUPPORT DMARC

    Mar 19, 2019

    Only around a quarter of the UK government’s gov.uk domains have been set up to support an industry best practice email validation system, despite the imminent retirement of a previous public sector domain platform, according to Egress. The security vendor found that just 28% of gov.uk domains...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=61896189

    SMBS COULD BE THE KEY TO CRACKING DATA BREACHES

    Mar 18, 2019

    If we want to reduce the number of successful cyberattacks that target businesses – we need to turn our attention towards small and medium-sized ones because, if a newly released report is to be believed, they are the weakest link in the chain. The report issued this morning by Business in the...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61766176

    WHY TRUST IS KEY FOR CYBER-SECURITY RISK MANAGEMENT

    Mar 18, 2019

    Trust is an often-overused term, but according to Rohit Ghai, president of RSA Security, trust is the key to understanding and managing digital risk. In a video interview with eWEEK, Ghai discusses his views on trust, where the concept of an artificial intelligence "digital twin" fits in a...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61776177

    TOP LONDON ATTRACTIONS HIT BY MILLIONS OF CYBERATTACKS

    Mar 18, 2019

    The UK's museums and other tourist attractions are being hit by more cyberattacks than ever before, new research has found. A Freedom of Information (FoI) request issued by the Parliament Street think tank to four major tourist attractions in the UK - Kew Gardens, National History Museum, Tate G...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61786178

    SHRED-IT HELPS HOTELIERS PREVENT DATA SECURITY ISSUES

    Mar 18, 2019

    Cyber breaches are a huge security concern for the hotel industry—but they’re not the only security concern. “The industry has seen its fair share of cybersecurity breaches over the last few years and while it is absolutely essential that hotels have their cybersecurity protections...

    HOTEL BUSINESS
    READ MORE

    /news-article.aspx?ID=61796179

    CBA ASSURES ITSELF OF LANDMARK WHITE'S POST-BREACH INFOSEC

    Mar 18, 2019

    First lender to reinstate valuation firm. CBA has reinstated LandMark White as an option to conduct residential property valuations, after the institution assured itself of the valuer’s information security following a data breach in January. LandMark White said in a financial filing that it a...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=61726172

    WOODSIDE BUYS INTO WA CYBER SECURITY FIRM

    Mar 18, 2019

    security firm that specialises in protecting critical infrastructure. The resources company announced today that, subject to conditions precedent, it would buy into Sapien Cyber Ltd. Sapien describes itself as providing a security solution for security both IT and OT. Woodside said that Sapien &ldqu...

    COMPUTERWORLD
    READ MORE

    /news-article.aspx?ID=61746174

    SECURITY BUDGETS GET AN SME BOOST IN 2019

    Mar 15, 2019

    Small and medium-sized enterprises will be spending more money on security this year, as well as hiring new staff, according to new research from Armor. Apparently, they’re more aware of the huge importance of having airtight cybersecurity. According to the report, four in five SMEs will be lo...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61736173

    KATHMANDU PROBES POSSIBLE CARD SKIMMING BREACH

    Mar 15, 2019

    In a statement posted to the New Zealand Exchange (NZE), the firm said it was notifying potentially affected customers directly, advising them to contact their banks and card providers. “Kathmandu has recently become aware that between January 8, 2019 NZDT and February 12, 2019 NZDT, an uniden...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=61706170

    VMWARE LAUNCHES SERVICE-DEFINED FIREWALL FOR INTRINSIC SECURITY

    Mar 15, 2019

    New Zealand-based outdoor clothing retailer Kathmandu is urgently investigating a potential breach of customer card data harvested from its websites. There are a number of different ways to think about security and how it should be implemented. For Tom Gillis, senior vice president and general manag...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61716171

    THE EUROPEAN COUNCIL HAS ANNOUNCED ITS POSITION ON CYBERSECURITY CENTRES

    Mar 14, 2019

    The European Council has announced that the European Union is stepping up its protection against cybersecurity threats, and is discussing a new structure of European cybersecurity centres. The European Council’s Permanent Representatives Committee have granted a mandate to the Romanian preside...

    SCITECH EUROPA
    READ MORE

    /news-article.aspx?ID=61556155

    5 CYBERSECURITY THREATS YOUR DNS LOGS ALREADY REVEAL

    Mar 14, 2019

    Cybersecurity can be an exhausting job. Between the onslaught of ‘silver bullet’ tools that supposedly protect organizations, and the additional layer of tools needed just to make sense of the first group, even the smartest teams are finding themselves stretched thin. There are signals a...

    TECHRADAR
    READ MORE

    /news-article.aspx?ID=61566156

    GEOSCIENCE AUSTRALIA TAKES ACTION AFTER CYBER SECURITY FAIL

    Mar 14, 2019

    Moves to have all Essential Eight in place by June 2020. Geoscience Australia has kicked off a program of work to implement all the government’s mandatory and non-mandatory cyber security requirements by 2020 after being labelled highly exposed to cyber-attack last year. In June 2018 the Austr...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=61576157

    CRYPTOJACKING TAKES A NEW TURN IN CRYPTOSINK CAMPAIGN

    Mar 14, 2019

    Researchers from F5 Labs reported on March 14 that they have discovered a new cryptojacking campaign that is abusing unpatched Elasticsearch servers. Unauthorized cryptocurrency mining, commonly referred to as "cryptojacking," is an attack trend that started in 2017 and hit a peak in mid-2...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61586158

    FACEBOOK SUFFERS GLOBAL OUTAGE, CLAIMS DDOS NOT THE CAUSE

    Mar 14, 2019

    Facebook users around the world had a singular question for much of March 13: Is Facebook down? As it turns out, the global social media giant and its related Instagram and WhatsApp services were in fact unavailable and down for much of the day. Some service was restored by March 14, though full glo...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61596159

    PROTECTING APPLICATIONS AGAINST DFA ATTACKS

    Mar 14, 2019

    2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption algorithm available to the public. Designed to replace older cryptographic algorithms that were starting to show weaknesses ...

    HELP NET SECURITY
    READ MORE

    /news-article.aspx?ID=61476147

    6SENSE ANNOUNCES SALESFORCE PARDOT INTEGRATION FOR REVENUE TEAMS TO LAUNCH COMPREHENSIVE ABM PROGRAMS

    Mar 14, 2019

    6sense, a leading Account Based Orchestration Platform, powered by AI, extends its relationship with Salesforce to include an all-new integration with Pardot, Salesforce’s marketing automation solution. This integration combines marketing execution from Salesforce Pardot with the time-based pr...

    SOURCE
    READ MORE

    /news-article.aspx?ID=67206720

    BLOCK IN RUSSIA UNJUSTIFIED, SAYS PROTONMAIL

    Mar 13, 2019

    Claiming that it had received multiple bomb threats via email messages, the Russian government restricted internet access, which resulting in blocking ProtonMail email servers, according to PortSwigger. In a March 12 blog post authored by Andy Yen, ProtonMail founder, Yen called the block "unju...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=61486148

    DPI19: OPEN BANKING AND DATA SHARING WILL BENEFIT CONSUMERS

    Mar 13, 2019

    Speaking at the IAPP Data Protection Intensive 2019 conference in London on 'How Privacy & Data Protection are Impacted by Competition Considerations,' Helena Koning, senior managing counsel and data protection officer at Mastercard, said that new rules on open banking are permitting mor...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=61496149

    CHINA THREAT OVERBLOWN BY EU CYBERSECURITY ACT

    Mar 13, 2019

    On Tuesday, March 12, Members of the European Parliament (MEPs) adopted the European Union (EU) Cybersecurity certification scheme for products, processes and services.The Cybersecurity Act is a scheme to ensure that certified products, processes and services sold in EU countries meet cybersecurity ...

    CGTN
    READ MORE

    /news-article.aspx?ID=61396139

    TETRATE EMERGES WITH ENTERPRISE SERVICE MESH PLATFORM

    Mar 13, 2019

    Tetrate officially launched on March 13, announcing its enterprise service mesh platform that is built on top of the open-source Istio and Envoy projects. The concept of a service mesh has been an emerging trend over the past year as an approach that enables networking connectivity and security poli...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61456145

    INSIDERS ARE BIGGEST SECURITY PROBLEM FOR COMPANIES TODAY: CYBER SECURITY EXPERT

    Mar 13, 2019

    Saryu Nayyar is the CEO of Gurucul, a company that specialises in user and entity behavior analytics, identity analytics, fraud analytics and cloud security analytics. Nayyar is an internationally recognised cyber security expert, author, speaker and member of the Forbes Technology Council. She has ...

    THE WEEK
    READ MORE

    /news-article.aspx?ID=61466146

    GEORGIA COUNTY PAYS $400,000 TO RANSOMWARE ATTACKERS

    Mar 12, 2019

    Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that crippled IT systems over a two-week period. Struggling to recover from the outage, local officials reportedly paid a ransom worth $400,000 in bitcoins to restore IT systems and infrastructure. Jackson...

    BANKINFOSECURITY
    READ MORE

    /news-article.aspx?ID=61356135

    EXPERTS EXPRESS CONCERNS AS CYBER SECURITY THREATS LOOM ON SMART CITIES

    Mar 12, 2019

    Cyber security threats loom large on Smart cities as the country embarks on a journey to create about 100 such cities driven by smart solutions, leveraging on cutting edge technology. Together, these Smart cities aim to house 40 per cent of India’s population and contribute about 75 per cent t...

    BUSINESS STANDARD
    READ MORE

    /news-article.aspx?ID=61366136

    THE MUST-HAVES FOR YOUR DATA CENTER CYBERSECURITY CHECKLIST

    Mar 12, 2019

    The cyberthreat landscape is changing faster than ever for data center managers. Cybercriminals pulled in record hauls last year from ransomware, business email compromise, and other nefarious schemes, and they’re expected to be investing some of that money in new attack methods and platforms....

    DATA CENTER KNOWLEDGE
    READ MORE

    /news-article.aspx?ID=61376137

    THE MOBILE APPLICATION SECURITY QUANDARY

    Mar 12, 2019

    The need for enhanced mobile application security is being driven by increasingly powerful mobile devices and the ubiquitous availability of bandwidth, says John Aisien of Blue Cedar. "Enterprise computing is not only moving to the cloud at an amazing pace, but some of that compute is also movi...

    BANKINFOSECURITY
    READ MORE

    /news-article.aspx?ID=61386138

    ADDIGY ADDS SINGLE SIGN-ON TO ITS APPLE DEVICE MANAGEMENT PLATFORM

    Mar 11, 2019

    Apple device management platform vendor Addigy has unveiled a wide range of new features for its cloud-based services, including single sign-on capabilities, LANCache peer-to-peer caching and expanded mobile device management (MDM) services. The new features, which were announced here at the Addigy ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61256125

    HOW TO REDUCE ERP SECURITY RISKS

    Mar 11, 2019

    Enterprise resource planning (ERP) systems are among the most critical enterprise applications that an organization operates and as such, they represent a lucrative target for attackers. In a session at the RSA Conference last week, Onapsis CTO JP Perez-Etchegoyen outlined what's behind ERP brea...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61266126

    ERICSSON TESTS FIRST CERTIFIED DEVICE FOR CTIA’S IOT CYBERSECURITY PROGRAM

    Mar 11, 2019

    An aftermarket connected car device is the first to be certified by CTIA’s IoT Cybersecurity Certification Program, which launched last August to help ensure the increasing number of cellular-connected devices have appropriate security capabilities. The device, the Harman Spark, is offered exc...

    ELECTRONIC COMPONENT NEWS
    READ MORE

    /news-article.aspx?ID=61276127

    HOW SMBS CAN BOLSTER CYBERSECURITY EFFORTS

    Mar 11, 2019

    Keeping current with cyberthreats is an imposing logistics problem facing small- and medium-sized businesses (SMBs)—cybercriminals are constantly changing their tactics. If something stops working or fails to provide sufficient return for their effort, the bad guys move on. That may work well ...

    TECHREPUBLIC
    READ MORE

    /news-article.aspx?ID=61286128

    SKILLS GAP IS LEADING TO MAJOR SECURITY WORRIES

    Mar 11, 2019

    Finding skilled cybersecurity staff is an increasingly difficult task, new research has claimed. A new report by Tripwire found it’s not just about not having actual people to do the job – it’s also due to the rapidly transforming technology and threat landscapes. Consequently, the...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61296129

    BANKING TROJANS SEE MAJOR RISE IN 2018

    Mar 08, 2019

    Kaspersky Lab has revealed a major rise in the number of banking Trojans, also known as "bankers". The company says it tracked almost 900,000 bankers in 2018, a 15 per cent increase compared to 2017, when it registered 767,000 attacks. Allegedly, there have been ‘increased activities...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61206120

    HUMAN ERROR STILL A MAJOR SECURITY WORRY

    Mar 08, 2019

    For businesses of all sizes, from SMBs to large corporations – human error is still one of the main pain points when it comes to cybersecurity. A new report from BAE Systems found 71 per cent of all recorded incidents started as a phishing attack, and roughly two thirds (65 per cent) were unta...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61226122

    WHAT’S REALLY BEHIND FACEBOOK’S NEW PRIVACY AND ENCRYPTION EFFORT?

    Mar 08, 2019

    On its face, Mark Zuckerberg’s announcement that Facebook plans to move to a more privacy-oriented service seems like welcome news, given how he and his company have run roughshod over his users’ privacy since its founding. But now he’s saying that he wants to make personal interac...

    EWEEK
    READ MORE

    /news-article.aspx?ID=61236123

    BREACHES AND LEAKS SOARED 424% IN 2018

    Mar 08, 2019

    Nearly 15 billion identity records circulated in underground communities in 2018, a 71% increase over the year as hackers targeted smaller organizations more widely, according to a new report from 4iQ. The identity intelligence company scanned the surface, social, deep and dark web for identity rela...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=61246124

    VIVA THE REVOLUTION: HOW CYBERSECURITY CAN HELP WITH DIGITAL TRANSFORMATION

    Mar 07, 2019

    We've had the Atomic Age, the Space Age and the Information Age, and now we're on the cusp of what could be called the culmination of all those – the Fourth Industrial Revolution, in which data, devices, and advanced technologies like biotech and nanotech are already bringing major cha...

    TECHRADAR
    READ MORE

    /news-article.aspx?ID=61086108

    OVERCOMING THE 2019 CYBER-THREAT

    Mar 07, 2019

    Over the last couple of years, the dramatic development of digital technologies has fuelled the growth and needs of the mobile workforce. Recent research by Microsoft found that only 11.4 per cent of European employees feel highly productive at work, and, amidst the arrival of innovative technologie...

    TECHRADAR
    READ MORE

    /news-article.aspx?ID=61096109

    FTSE 350 BOARDS STILL STRUGGLING WITH CYBER AWARENESS

    Mar 06, 2019

    UK boards are getting better at understanding cybersecurity as a strategic issue, but still lack crucial awareness of the impact of attacks on their organization, according to a new government report. The FTSE 350 Cyber Governance Health Check 2018 features data collected from interviews with the to...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60986098

    NEW GOOGLE CHROME ZERO-DAY VULNERABILITY FOUND ACTIVELY EXPLOITED IN THE WILD

    Mar 06, 2019

    You must update your Google Chrome immediately to the latest version of the web browsing application. Security researcher Clement Lecigne of Google's Threat Analysis Group discovered and reported a high severity vulnerability in Chrome late last month that could allow remote attackers to execute...

    THE HACKER NEWS
    READ MORE

    /news-article.aspx?ID=60996099

    MOBILE MALWARE ATTACKS DOUBLE IN 2018

    Mar 06, 2019

    Smartphones are facing more security threats than ever before, with mobile malware attacks hitting a new high in 2018, new research has found. Findings from Kaspersky Lab report that the number of mobile malware attacks doubled in 2018, topping 116.5 million last year, compared to 66.4 million in 20...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61056105

    MASSIVE SPOILER VULNERABILITY AFFECTS INTEL CPUS

    Mar 06, 2019

    Another major security vulnerability is affecting Intel processors, experts have warned. SPOILER was detected by researchers at Worcester Polytechnic Institute in Massachusetts and the University of Lübeck in Germany, and could be even more dangerous that the infamous Spectre vulnerability. The...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61216121

    DIRECTIVE RANKS #1 IN CLUTCH’S TOP B2B MARKETING SERVICE PROVIDERS

    Mar 06, 2019

    Directive, the leading B2B and enterprise search marketing agency, has recently been honored as the number one B2B marketing and advertising service provider in Los Angeles, according to Clutch. Clutch is a B2B research, ratings and reviews site that identifies leading IT and marketing service provi...

    SOURCE
    READ MORE

    /news-article.aspx?ID=66336633

    RSA SECURITY OUTLINES A PATH FOR THE TRUST FUTURE

    Mar 05, 2019

    Often RSA Conference keynotes detail new technologies or outline existing challenges. At the RSA Conference 2019 here, RSA Security took a different approach this year—predicting a possible future that could be less than ideal for humanity unless the right steps are taken. Rohit Ghai, presiden...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60956095

    MICROSOFT SECURITY SERVICES PUT AI, EXPERTS TO WORK AGAINST THREATS

    Mar 05, 2019

    Microsoft is rolling out a brace of threat fighting capabilities for Windows 10 administrators that promise to bring the big guns of the company’s security experts, as well as its AI capabilities, to bear against attackers. The new services are Microsoft Azure Sentinel and Microsoft Threat Exp...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60966096

    HOW TO STAY AHEAD OF THE NEXT OPERATIONAL TECHNOLOGY THREAT

    Mar 05, 2019

    The daily deluge of negative security headlines and data breaches isn't the whole story when it comes to modern cyber-security, according to Cisco. In a keynote at the RSA Conference here, Cisco executives outlined some key successes against recent threats and detailed a strategy for bridging th...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60976097

    FINANCIAL FIRMS FACING GREATER CYBER THREAT

    Mar 05, 2019

    Banks and other financial businesses are facing a greater cybersecurity threat than ever before, new findings have said. Research from security firm Carbon Black found that over two-thirds (67 per cent) of finance firms have reported an increase in cyberattacks over the past 12 months as hackers goe...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61076107

    LAZARUS GROUP RETURNS WITH MAJOR SPEARPHISHING CAMPAIGN

    Mar 04, 2019

    North Korean hacking outfit Lazarus Group is targeting users around the world with a major new spearphishing campaign. Security firm McAfee says it has found evidence linking Lazarus to the huge Operation Sharpshooter attack first detected last December which uses sophisticated spearphishing emails ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=61066106

    WHY RANSOMWARE IS STILL AN ACTIVE THREAT

    Mar 04, 2019

    For several years, ransomware was a rising threat, causing hundreds of millions of dollars in damages and disrupting operations around the world. But what is the state of ransomware in 2019?  In a session at the RSA Conference here, a pair of McAfee researchers detailed how the threat landscape...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60856085

    MCAFEE CONFIRMS OPERATION SHARPSHOOTER LINK TO NORTH KOREA

    Mar 04, 2019

    Researchers have confirmed the Operation Sharpshooter APT campaign uncovered in December 2018 is likely the work of North Korean hackers, and has been active for a year longer than previously thought. McAfee revealed today that it was given a rare insight into the inner workings of such a group afte...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60866086

    SECURITY LEADERS SUFFERING FROM CYBER FATIGUE

    Mar 04, 2019

    Cybersecurity professionals are positive about the challenges of dealing with the growing number of threats around today, but many still feel pessimistic about their work, new research has found. A significant number of workers say they are suffering from "cyber fatigue" according to Cisco...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=60886088

    IT SECURITY PROGRAMMES BEING DELAYED BY BOARD HOLD-UPS

    Mar 01, 2019

    Two-thirds of UK firms believe their security programme is now "continuously reactive". UK firms are split between a desire protect their products or their business when it comes to security priorities, according to new research. A report from Optiv found that many UK IT security decision ...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=60896089

    MASSCYBERCENTER SAYS STATE FACES INCREASED THREATS

    Mar 01, 2019

    The state of Massachusetts is reportedly facing increased cyber threats from adversaries who are trying to steal sensitive information, according to the Gloucester Daily Times. In an interview with Stephanie Helm, director of the MassCyberCenter, State House reporter Christian M. Wade learned that t...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60876087

    UK GOVERNMENT UPS SECURITY PROTECTION FOR IOT DEVICES

    Mar 01, 2019

    IoT-connected devices will need to ensure they measure up to basic security standards under new rules being proposed by the UK government. Guidelines revealed today will mean that manufacturers will need to make smart devices such as TVs, routers and even children's toys conform to a new 'Se...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=64466446

    DOCKER RESPONDS TO DATA BREACH AND OUTLINES THE CONTAINER FUTURE

    Mar 01, 2019

    The elephant or rather the whale in the room at DockerCon this week, was the data breach of the Docker Hub, first disclosed on April 26. During a keynote address and in a private press session at DockerCon on May 1, Docker executives provided a formal response to the data breach, which impacted 190,...

    EWEEK
    READ MORE

    /news-article.aspx?ID=64476447

    MICROSOFT ADDS OFFICE 365 SECURITY POLICY ADVISOR SERVICE

    Mar 01, 2019

    Microsoft has introduced a new Security Policy Advisor service to make it easier for enterprise IT managers to create and manage security policies for users of Office 365. The advisor service, which was announced by Jared Spataro, a Microsoft 365 corporate vice president, in a recent post on the Mic...

    EWEEK
    READ MORE

    /news-article.aspx?ID=64486448

    U.S. CYBER-WARRIORS DISRUPT RUSSIAN ELECTION ATTACKS

    Feb 28, 2019

    It started in mid-October 2018, when Russian operatives of the Internet Research Agency started getting emails and direct messages on social media letting them know that the United States was watching them, that it knew their names and where they worked. Then, on Nov. 6, 2018, everything went dark f...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60726072

    STUDY: BREAKING SILOS COULD REDUCE BREACH COSTS

    Feb 28, 2019

    The cybersecurity industry experienced some ups and downs last year, according to the 3,200 senior security professionals from 18 countries who participated in Cisco’s fifth annual CISO Benchmark Study. The study revealed that security professionals experienced both encouraging gains, with onl...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60736073

    HIRING, THREATS AND BUDGET CAUSE BIGGEST SECURITY HEADACHES

    Feb 28, 2019

    The three biggest challenges faced by IT professionals relate to threats, hiring and budget.. According to a survey of 1500 IT professionals by LogRhythm, the top challenges were divided as follows: Inability to detect the full range of threats – 34%. Difficulty in finding skilled cyber profes...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60746074

    GLOBAL SPAM CALLS HIT 85 BILLION IN 2018

    Feb 28, 2019

    Global spam calls have soared by 325% over 2018 to reach a staggering 85 billion worldwide, according to new findings from Hiya. The Caller ID company claimed in its first Global Robocall Radar report that spam rates in Spain (24%), the UK (22%), Italy (21%) and France (20%) are the highest in the w...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60756075

    SSL-BASED PHISHING SURGES 400% FROM 2017

    Feb 28, 2019

    Hackers are increasingly using encrypted traffic to hide their attacks from security filters, with phishing emails soaring in popularity, according to new data from Zscaler. The cloud security provider processes more than 60 billion transactions per day and claimed that hiding threats in SSL traffic...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60766076

    SYMANTEC ADVANCES INTEGRATED CYBER DEFENSE PLATFORM

    Feb 27, 2019

    No one technology or vendor can protect an organization against all cyber-security risks. That's why Symantec has been pushing forward its vision of an Integrated Cyber Defense platform (ICD) in an effort to bring together multiple technologies with an integrated approach. On Feb. 27, Symantec a...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60776077

    MOST UK IT SECURITY LEADERS FEAR CNI ATTACK

    Feb 27, 2019

    Over half of organizations believe the UK is heading for a major attack on critical infrastructure (CNI) this year, with siloed teams causing dangerous security gaps between IT and OT functions, according to Infosecurity Europe. The region’s leading information security event polled over 12,00...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60716071

    CYBER SECURITY DURING MERGERS AND ACQUISITIONS (M & A)

    Feb 26, 2019

    On face value, one may question what company mergers, acquisitions, or takeovers have to do with cyber security. But for law firms charged with overseeing the safe completion of such transactions, cyber security should be a core consideration, for two key reasons. Firstly, there is a risk that durin...

    TODAY’S CONVEYANCER
    READ MORE

    /news-article.aspx?ID=60486048

    ORDR RAISES $16.5 MILLION FOR NETWORK-LEVEL CYBERSECURITY

    Feb 26, 2019

    In this day and age, enterprises can’t take a traditional IT approach to security — or so claims Ordr, a Santa Clara, California-based startup developing a network-level cybersecurity platform. It contends that the client-side security suites installed on legacy workstations, laptops, an...

    VENTUREBEAT
    READ MORE

    /news-article.aspx?ID=60576057

    GV LEADS $15 MILLION INVESTMENT IN STEALTH CANADIAN CYBERSECURITY STARTUP CMD

    Feb 26, 2019

    A Canadian cybersecurity startup is emerging from stealth today with a fresh $15 million in funding from Alphabet investment arm GV, with participation from startup studio Expa, Amplify Partners, and a host of additional “strategic investors.” Founded in early 2016, Cmd is the brainchild...

    VENTUREBEAT
    READ MORE

    /news-article.aspx?ID=60586058

    PRIVILEGED CREDENTIAL ABUSE INVOLVED IN 74% OF DATA BREACHES, SAYS STUDY

    Feb 26, 2019

    Cybercriminals are continuing to target low-hanging fruit; according to a new study from Centrify, the security and identify firm, while 74% of data breaches involved privileged credential abuse, identity and access management resources are severely lacking among enterprises. The survey of 1,000 IT ...

    INFORMATION AGE
    READ MORE

    /news-article.aspx?ID=60596059

    HOW GAMIFICATION CAN BOOST CYBER SECURITY

    Feb 26, 2019

    Insider threats are costing companies hugely. In fact, according to the Ponemon Institute, the average cost of data breaches caused by employees is more than $8 million (£6.1 million) per year. Many breaches are caused accidentally when employees click on phishing emails or unknowingly open su...

    INFORMATION AGE
    READ MORE

    /news-article.aspx?ID=60606060

    UCONN HEALTH AMONG THE LATEST PHISHING VICTIM

    Feb 25, 2019

    Phishing and other hacking incidents have led to several recently reported large health data breaches, including one that UConn Health reports affected 326,000 individuals. In describing a phishing attack, UConn Health says that on Dec. 24, 2018, it determined that an unauthorized third party illega...

    BANKINFOSECURITY
    READ MORE

    /news-article.aspx?ID=60616061

    NEW DNS ATTACKS MAKE USE OF DNSSEC MORE CRITICAL THAN EVER

    Feb 25, 2019

    An insidious new series of cyber-attacks that redirect traffic intended for specific websites by changing their DNS records has resulted in the first emergency directive by the Cybersecurity and Infrastructure Security Agency. This directive was followed in February by an alert by ICANN (Internet Co...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60626062

    MAJOR SECURITY FLAWS DISCOVERED IN 4G AND 5G

    Feb 25, 2019

    Researchers have uncovered a number of major security holes in the communications protocols governing 4G and 5G networks. The flaws could allow an attacker, even not one necessarily highly skilled or educated, to intercept phone calls and track the victim's location. The flaw was uncovered by Ni...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=60636063

    ICANN: WE NEED DNSSEC EVERYWHERE TO COMBAT HACKERS

    Feb 25, 2019

    ICANN has called on Domain Name System (DNS) stakeholders to urgently improve security across all domains to combat a growing threat from attackers. It wants DNS Security Extensions (DNSSEC) to be rolled out worldwide across all unsecured domain names in response to a wave of new DNS hijacking attac...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60496049

    HACKERS ABUSE LINKEDIN DMS TO PLANT MALWARE

    Feb 25, 2019

    Hackers are impersonating recruitment agencies on LinkedIn in a bid to target companies with backdoor malware. Researchers at Proofpoint found that the malware campaigns primarily targeted US companies in various industries including retail, entertainment, pharmacy, and others that commonly employ o...

    IT PRO
    READ MORE

    /news-article.aspx?ID=60476047

    A V-CISO’S TAKE ON THE 5 ISSUES FACING CYBERSECURITY

    Feb 25, 2019

    In just 20 years, we’ve seen the cybersecurity field grow from virtually non-existent into a $120 billion industry. But no matter how much it grows, it still feels like the bad guys are always two steps ahead. Why? Because our adversaries are, in fact, at an advantage. This advantage has less ...

    SECURITY BOULEVARD
    READ MORE

    /news-article.aspx?ID=60336033

    SOME GPS RISK VIOLATING GDPR BY SIGNING UP TO CHANGES IN CHILDHOOD HEALTH DATA SHARING

    Feb 25, 2019

    As many as 3,300 GP practices in England risk violating data protection laws if they sign up to changes in a data sharing agreement for childhood vaccination. Changes to the Child Health Information Service (CHIS), used by general practitioners in the West Midlands, parts of London and the South Wes...

    IT PRO
    READ MORE

    /news-article.aspx?ID=60436043

    LABOUR REPORTS DATA BREACH TO THE ICO AFTER MPS JOIN THE INDEPENDENT GROUP

    Feb 25, 2019

    The Labour Party has reported an alleged data breach to the Information Commissioner's Office (ICO) over fears the personal data of party members was improperly accessed following the resignation of several MPs this week. It is understood the party has accused at least one of the eight former La...

    IT PRO
    READ MORE

    /news-article.aspx?ID=60446044

    81 PER CENT OF CANADIANS CONCERNED ABOUT CYBER SECURITY

    Feb 24, 2019

    Eighty-one per cent of Canadians say they are concerned about the security of personal information held by a government department if it experiences a cyber attack. Almost eight out of 10 Canadians are also concerned about cyber attacks against organizations that may have access to their personal in...

    VICTORIA NEWS
    READ MORE

    /news-article.aspx?ID=60306030

    FLAWS DISCOVERED IN POPULAR PASSWORD MANAGERS, REPORT CLAIMS

    Feb 22, 2019

    An analysis of multiple top password manager products has revealed vulnerabilities in the tools they use that could potentially put the security of user's credentials at risk, according to Independent Security Evaluators (ISE). A new study, Under the Hood of Secrets Management, found that a vari...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60316031

    ENTRUST TO ACQUIRE NCIPHER SECURITY TO APPROVE GEMALTO DEAL

    Feb 22, 2019

    Entrust Datacard has announced a definitive agreement to acquire nCipher Security. Less than a month after nCipher de-merged from Thales, the deal will see nCipher’s identity-based and PKI security solutions become part of Entrust, enabling Thales to complete its acquisition of Gemalto. Operat...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=60326032

    19-YEAR-OLD VULNERABILITY IN WINRAR FINALLY FIXED

    Feb 22, 2019

    Security researchers have discovered a bug in the WinRAR file compression application that can allow hackers to execute code remotely. The flaw has existed in all versions of the software for the last 19 years. According to a blog post by researchers at Check Point Software, the exploit works by jus...

    IT PRO
    READ MORE

    /news-article.aspx?ID=60456045

    MALWARE MINING MONERO DISCOVERED USING HACKING TOOLS TO INFECT WINDOWS SYSTEMS

    Feb 22, 2019

    Security researchers have discovered Monero mining malware that uses hacking tools such as Radmin and Mimikatz to propagate through Windows systems. According to a blog post by security researchers at Trend Micro, the malware scans for open port 445 and exploit a Windows SMB Server Vulnerability MS1...

    IT PRO
    READ MORE

    /news-article.aspx?ID=60466046

    CYBER SECURITY MARKET COMPETITIVE SCENARIO, DRIVERS AND CHALLENGES ANALYSIS FORECAST 2028

    Feb 22, 2019

    Cyber security is designed to ensure integrity and to protect networks, computer programs, and data from unauthorized access or breaches. Various sectors use cloud services to collect and store confidential data and information, which is transferred across networks. Cyber security software plays a c...

    MARKETWATCH
    READ MORE

    /news-article.aspx?ID=60156015

    K2 CYBER SECURITY UNVEILS CLOUD WORKLOAD PROTECTION PLATFORM TO PREVENT ZERO-DAY ATTACKS IN REAL TIME

    Feb 21, 2019

    K2 Cyber Security, Inc. today announced the general availability of its cloud workload security platform, featuring two fundamental innovations that together deliver comprehensive protection for hybrid cloud environments. K2’s Optimized Control Flow Integrity (CFI)™ technology ensures an...

    DARK READING
    READ MORE

    /news-article.aspx?ID=60166016

    THE CYBERSECURITY 202: ELECTION SECURITY IS GOING TO BE THE HOT NEW DEMOCRATIC CAMPAIGN ISSUE IN 2020

    Feb 21, 2019

    Russian hacking upended Hillary Clinton's 2016 campaign. And it's already impacting the way 2020 Democrats are campaigning this time around. Election security is already emerging as a key talking point on the campaign trail as Democrats offer up policies to secure votes from potential tamper...

    THE WASHINGTON POST
    READ MORE

    /news-article.aspx?ID=60176017

    NHS CYBERSECURITY NEEDS TO BE A QUALIFIED SUCCESS

    Feb 21, 2019

    A freedom of information request which revealed a lack of cyber and information governance training may be something of a red herring. But that doesn’t mean there isn’t valuable work to be done on creating a cyber-qualified NHS IT workforce, our expert columnist Davey Winder argues.When ...

    DIGITAL HEALTH
    READ MORE

    /news-article.aspx?ID=60186018

    CYBERX WINS CYBERSECURITY EXCELLENCE AWARDS IN THREE CATEGORIES

    Feb 21, 2019

    CyberX, the IIoT and industrial control system (ICS) security company, today announced it is a winner in three distinct product categories of the 2019 Cybersecurity Excellence Awards: IoT Security, ICS/SCADA Security, and Critical Infrastructure Security. These coveted awards recognize CyberX’...

    GLOBENEWSWIRE
    READ MORE

    /news-article.aspx?ID=60196019

    SYDNEY AIRPORT TO ESTABLISH CYBER SECURITY CENTRE

    Feb 21, 2019

    Lifts defences to reduce threats. Sydney Airport is preparing to establish an around-the-clock cyber security operations centre to protect its systems and data holdings from the threat of cyber-attack. The new centre, which is expected to be up and running by April, is aimed at enhancing “cybe...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=60206020

    ERICSSON, NOKIA STRIKE BACK AT 5G READINESS CONCERNS

    Feb 21, 2019

    Ericsson and Nokia are intent on countering the notion that they are not as prepared as China-based rival Huawei to supply operators with 5G network equipment. The push comes just days ahead of the MWC 2019 event in Barcelona, Spain, where 5G will be the hot topic. Executive from both Nordic vendors...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=60216021

    TOYOTA AUSTRALIA CONFIRMS 'ATTEMPTED CYBER ATTACK'

    Feb 21, 2019

    Toyota Australia has said it was hit with what it is calling an "attempted cyber attack". "At this stage, we believe no private employee or customer data has been accessed," the company said in a short statement on its site. "The threat is being managed by our IT department,...

    ZDNET
    READ MORE

    /news-article.aspx?ID=60076007

    SYMANTEC'S EMAIL FRAUD PROTECTION OFFERING COMBATS BEC

    Feb 20, 2019

    Today’s topics include Symantec improving email security with fraud protection, and Azure maps getting new SDKs, services and expanded features. On Feb. 14, Symantec announced its Email Fraud Protection offering to help organizations combat Business Email Compromise, which involves attackers s...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60056005

    K2 CYBER SECURITY TAKES DETERMINISTIC APPROACH TO THREAT DETECTION

    Feb 20, 2019

    There are a lot of cyber-security startups that make use of artificial intelligence to help organizations detect new threats, but K2 Cyber Security isn't one of them. K2 officially emerged from stealth on Feb. 20 along with its cloud workload security platform that takes a deterministic real-tim...

    EWEEK
    READ MORE

    /news-article.aspx?ID=60066006

    NORTH KOREAN LAZARUS GROUP STARTS TARGETING RUSSIAN ORGANIZATIONS

    Feb 20, 2019

    In an unusual move, the Lazarus hacking group associated with the North Korean government has recently started targeting organizations from Russia. The group’s primary targets until now have been organizations from countries with which North Korea has geopolitical tensions, such as South Korea...

    SECURITY BOULEVARD
    READ MORE

    /news-article.aspx?ID=60296029

    SURVEY FINDS SECURITY TEAMS BETTING ON MACHINE LEARNING

    Feb 20, 2019

    A global survey conducted by Enterprise Strategy Group (ESG) of 456 cybersecurity and IT professionals on behalf of Oracle and KPMG has found organizations are being overwhelmed by data and are hoping to get some help via machine learning. According to the survey results, fewer than one-third of res...

    SECURITY BOULEVARD
    READ MORE

    /news-article.aspx?ID=60346034

    GOOGLE ERRED IN NOT DISCLOSING MICROPHONE IN NEST SECURITY SYSTEM

    Feb 20, 2019

    Google admitted that it didn’t tell users about a built-in microphone in its Nest Secure home security system, according to a report from Reuters. On Wednesday (Feb. 20), the company said it made an error, but that it wasn’t keeping the microphone a secret. “The on-device microphon...

    PYMNTS
    READ MORE

    /news-article.aspx?ID=60356035

    FORTINET BOOSTS SECURITY MESSAGE FOR CARRIER PUSH TO 5G

    Feb 19, 2019

    Fortinet touted a new proprietary virtual security processing technology a week before the MWC Barcelona trade show in a race to boost security for carriers moving from 4G LTE to 5G. The virtual technology is designed to aid faster connection speeds and secure mobile control at the core and edge clo...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=60086008

    LANDMARK WHITE DATA BREACH COULD IMPACT WESTPAC PROPERTY SERVICE CUSTOMERS

    Feb 19, 2019

    Westpac Group has warned customers that those who have conducted a property valuation through its business may have been inadvertently impacted by a separate data breach affecting LandMark White. On Tuesday, the Australian bank and financial services company said the recent security incident at Land...

    ZDNET
    READ MORE

    /news-article.aspx?ID=60096009

    ISRAEL LAUNCHES CYBERSECURITY HOTLINE FOR SUSPECTED HACKING

    Feb 19, 2019

    Israel has launched a cyber hotline, staffed mostly by veterans of military computing units, to enable businesses and private individuals to report suspected hacking and receive real-time solutions. The 119 call-in number to the Computer Emergency Response Center is being billed by Israel and cybers...

    HAARETZ
    READ MORE

    /news-article.aspx?ID=59945994

    FIVE THINGS ENTERPRISES NEED TO KNOW ABOUT THREAT LANDSCAPE

    Feb 19, 2019

    It would be easy to say that 2019 is going to be the year of the state-sponsored hacker, but it would also be easy to say that this year is going to be the year of the cryptojacker. Or I could say that this is the year when cross-site scripting is going to be a major threat. But the reality is that ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59955995

    HOW MACHINE LEARNING-BASED SECURITY SEES RISK FASTER THAN LEGACY TOOLS

    Feb 19, 2019

    Machine learning (ML) and artificial intelligence (AI) are in the process of changing almost every aspect of our lives. My last post focused on how AI can be used to help businesses manage their IT environments better. This post will look at the impact ML has on security. The biggest challenge with ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59965996

    PULSE SECURE ADDS SOFTWARE DEFINED PERIMETER TO SECURE ACCESS PLATFORM

    Feb 19, 2019

    Pulse Secure announced the launch of a new Software Defined Perimeter (SDP) offering on Feb. 19, that integrates with the company's existing Secure Access platform. SDP is an industry standard framework approach led by the Cloud Security Alliance (CSA) that provides access and authentication com...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59975997

    SWEDEN’S PATIENT HOTLINE IN MAJOR PRIVACY SNAFU

    Feb 19, 2019

    Millions of highly sensitive audio files linked to a Swedish healthcare hotline have been left exposed online for several years, in what could be a major breach of the GDPR. The 2.7 million files in question amount to 170,000 hours of calls, dating back to 2013 and left on an open Apache web server ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59985998

    RUSSIAN STATE HACKERS TAKE MINUTES TO MOVE LATERALLY

    Feb 19, 2019

    There was a major rise in Chinese state-sponsored cyber-activity in 2018 while Russian actors were by far the most operationally effective, according to the latest report from CrowdStrike. The security vendor’s 2019 Global Threat Report tracked the relatively new metric of “breakout time...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59995999

    WHY CHINA IS PROBABLY BEHIND THE CANBERRA CYBER-ATTACK

    Feb 19, 2019

    Since Prime Minister Scott Morrison announced a "sophisticated state actor" had tried to hack into Australia's major political parties' networks, the government has shut down any efforts to pin the blame on China. Mr Morrison dodged multiple questions from 3AW broadcaster Neil Mitc...

    9NEWS
    READ MORE

    /news-article.aspx?ID=59895989

    CHINESE SURVEILLANCE DATABASE EXPOSES MILLIONS OF IDS

    Feb 18, 2019

    Security researchers have spotted a mass data leak from an unsecured database which exposed the personal details of over 2.5 million surveilled Chinese residents. SenseNets Technology uses AI-powered technology in facial recognition cameras to record the movements of millions of minority Uighurs in ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59905990

    TOP 6 COUNTRIES WITH THE BEST CYBER SECURITY MEASURES

    Feb 18, 2019

    Cyber risks represent a genuine risk to governments, economies, organizations and people. In 2015, the US Government’s Office of Personnel Management was breached and traded off, with the organization declaring that 21.5 million social security numbers were stolen from one source, and 4.2 mill...

    ANALYTICS INSIGHT
    READ MORE

    /news-article.aspx?ID=59815981

    SYMANTEC IMPROVES EMAIL SECURITY WITH FRAUD PROTECTION

    Feb 15, 2019

    Symantec is looking to reduce the risk of business email compromise attacks with a new offering that makes it easier to implement and manage Domain-based Message Authentication, Reporting and Conformance (DMARC) for email authenticity. Among the most common risks that enterprises face are email frau...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59825982

    HUAWEI RISK CAN BE MANAGED, SAY UK CYBER-SECURITY CHIEFS

    Feb 15, 2019

    Any risk posed by involving the Chinese technology giant Huawei in UK telecoms projects can be managed, cyber-security chiefs have determined. The UK's National Cyber Security Centre's decision undermines US efforts to persuade its allies to ban the firm from 5G communications networks. The ...

    BBC
    READ MORE

    /news-article.aspx?ID=59835983

    CYBER ATTACK ON MALTA'S BANK OF VALLETTA

    Feb 15, 2019

    Malta's largest bank was the target of a cyber attack Feb 13, with hackers attempting to withdraw €13mil (RM59.7mil), Prime Minister Joseph Muscat said. The Bank of Valletta, in which the government is the largest shareholder, shut down its systems, closing branches and ATMs, and suspending...

    THE STAR
    READ MORE

    /news-article.aspx?ID=59885988

    BIG THEMES SET TO EMERGE AT RSA CONFERENCE 2019

    Feb 14, 2019

    With hundreds of specialized sessions, there is always a lot to take in at the annual RSA Conference held in San Francisco. The 2019 event is set to get under way March 4-8 and will tackle all manner of cyber-security topics ranging from new threats, to privacy regulations, emerging technologies and...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59745974

    HACKERS TARGET MALTESE BANK IN €13M CYBER HEIST

    Feb 14, 2019

    A leading Maltese bank is resuming its services today after shutting down operations following a major cyber-attack on Wednesday. The Bank of Valetta (BOV) said in a notice on Thursday morning that customers could once again use ATMs, online banking, mobile Banking and their BOV cards, although at t...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59755975

    LOVE BUG FOUND IN OKCUPID ANDROID APP

    Feb 14, 2019

    Only days after Infosecurity reported that OkCupid users said their accounts had been hacked, Checkmarx disclosed that the OkCupid Android App actually posed risks because of security failures in MagicLinks. It’s well known that malicious actors love to exploit a good holiday, which puts users...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59765976

    PATCH TUESDAY ROUNDUP INCLUDES IE ZERO DAY

    Feb 13, 2019

    Microsoft has given system admins plenty of work to do this month with patches for nearly 80 vulnerabilities, including a zero-day flaw in Internet Explorer and a publicly disclosed Exchange server bug. Top of the priority list in this month’s Patch Tuesday security round-up will probably be C...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59675967

    PALO ALTO NETWORKS ACCELERATES SECURITY IN PAN-OS 9.0 UPDATE

    Feb 13, 2019

    Palo Alto Networks is boosting its network security platforms with the new PAN-OS 9.0 update that was announced on Feb. 12. PAN-OS is a hardened operating system based on Linux that provides a secure, enterprise grade environment for executing Palo Alto's network security capabilities. PAN-OS 9....

    EWEEK
    READ MORE

    /news-article.aspx?ID=59685968

    MILLIONS AFFECTED BY 500PX DATA BREACH

    Feb 13, 2019

    Online photography network 500px has forced a password reset for all users after revealing this week that it suffered a data breach last summer. The site claimed that the incident, which it believes occurred on around July 5 2018, was not discovered until last week, when its engineering team “...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59695969

    ATTIVO NETWORKS ENHANCES DECEPTION PLATFORM WITH FORENSIC COLLECTION

    Feb 13, 2019

    Attivo Networks announced on Feb. 12 that it is expanding its ThreatDefend cyber-security deception platform with its new "The Informer" forensic collection technology. Deception is a class of cyber-security technology that aims to trick attackers with fake services as an approach to help ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59705970

    CDSA RELEASES FIRST TV, FILM CYBERSECURITY GUIDELINES

    Feb 12, 2019

    The Content Delivery and Security Association (CDSA), which advocates for protection of media content, has issued its first TV and film security, notably cybersecurity, guidelines for everything from how to deal with data breaches to keeping costumes and props within the production "perimeter.&...

    BROADCASTING & CABLE
    READ MORE

    /news-article.aspx?ID=59595959

    QUALYS EXTENDS CLOUD PLATFORM WITH PATCH MANAGEMENT

    Feb 12, 2019

    Qualys announced a new patch management application on Feb. 12, providing organizations with the ability to more easily manage the often-complex process of keeping infrastructure software updated. Qualys Patch Management (PM) is part of the Qualys Cloud Platform service that runs with a single agent...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59605960

    FIRMS URGED TO PATCH SERIOUS CONTAINER RUNTIME FLAW

    Feb 12, 2019

    Enterprises have been urged to patch a serious flaw in runc, the default runtime for Docker and Kubernetes, and ensure they have SELinux enabled. Aleksa Sarai — one of the maintainers for runc — made the initial announcement on Tuesday, attributing the discovery to researchers Adam Iwani...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59615961

    PHISHING, HUMANS ROOT OF MOST HEALTHCARE ATTACKS

    Feb 12, 2019

    Across healthcare organizations in the US, malicious actors are successfully leveraging phishing attacks to initially gain access to networks, according to findings from the 2019 HIMSS Cybersecurity Survey published by the Healthcare Information and Management Systems Society (HIMSS). The study, whi...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59625962

    MUMSNET PRIVACY SNAFU EXPOSES USER INFO

    Feb 11, 2019

    Mumsnet has suffered a serious data leak affecting potentially thousands of users after a software glitch during an IT system migration to the cloud. Justine Roberts, founder and CEO of the popular parenting forum, explained in a blog post late last week that the issue affected users for the best pa...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59515951

    AWS ISSUES ALERT FOR MULTIPLE CONTAINER SYSTEMS

    Feb 11, 2019

    A security issue that affects several open source container management systems, including Amazon Linux and Amazon Elastic Container Service, has been disclosed by AWS. The vulnerabilities (CVE-2019-5736) were reportedly discovered by security researchers Adam Iwaniuk, Borys Poplawski and Aleksa Sara...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59525952

    RESEARCHERS WARN OF MALICIOUS CONTAINER ESCAPE VULNERABILITY

    Feb 11, 2019

    A new vulnerability in the core runc container code could potentially enable a malicious container to get access to the host operating system. Major vendors and cloud providers are already pushing out patches, but there are other things users can do to limit risk. A new serious vulnerability in cont...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59565956

    CHECK POINT REFINING ITS SECURITY OFFERINGS TO MEET EVOLVING DEMANDS

    Feb 08, 2019

    When Check Point Software began its work in the IT security industry in 1993, smartphones, mobile tablets, IoT, and cloud applications and services didn't yet exist. Back then, Check Point's No. 1 job was providing state-of-the-art security to protect hardware, data centers and desktop machi...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59435943

    SECURITY UNICORN ILLUMIO RAISES $65M, HIRES A NEW CFO

    Feb 08, 2019

    Security unicorn Illumio raised $65 million in a Series E round and hired Anup Singh as its chief financial officer. The latest funding brings its total to $332.5 million and follows an even bigger $125 million Series D investment in June 2017. And — perhaps more importantly — it confirm...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=59445944

    BLUE HEXAGON USES THE POWER OF DEEP LEARNING TO DETECT NETWORK THREATS

    Feb 08, 2019

    Blue Hexagon emerges from stealth with a cyber-security platform that makes use of deep learning techniques to infer when potential malware is active on a network. As attackers become increasingly sophisticated, there is a need for advanced technologies that can detect attacks that traditional tools...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59455945

    NETOGRAPHY EMERGES WITH AUTONOMOUS FLOW-BASED DDOS DEFENSE SERVICE

    Feb 07, 2019

    Cyber-security startup Netography emerged from stealth on Feb. 7 with a new technology approach to help organizations defend against the risk of distributed denial-of-service (DDoS) attacks. DDoS attacks typically involve large volumes of attack bandwidth that overwhelm services, rendering them unav...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59365936

    SOUTH AFRICAN UTILITY SUFFERS DOUBLE SECURITY BLOW

    Feb 07, 2019

    South Africa’s largest electricity supplier has come under fire for apparently ignoring a serious leak of customer data. Eskom, which claims to transmit and distribute 95% of the electricity used in the country, was called out earlier this week on Twitter by a frustrated security researcher. &...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59375937

    CHINA’S MSS TARGETED MAJOR EUROPEAN MSP: REPORT

    Feb 07, 2019

    Security researchers have discovered another Chinese state-sponsored APT campaign, this time targeting a major European MSP with the likely intent of stealing IP from its customers. Recorded Future and Rapid7 claimed in a new co-authored report that the notorious APT10 group, linked to China’s...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59385938

    NEW RESEARCH PULLS BACK THE CURTAIN ON ENTERPRISE CONTENT MARKETING IN 2019

    Feb 07, 2019

    With thousands of employees, working across multiple brands, products lines, offices and silos, enterprise marketers face unique content marketing challenges, yet many are scoring wins year after year. That’s according to the findings in the Content Marketing Institute’s new research rep...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68016801

    DISCONNECT BETWEEN CONSUMERS & BUSINESSES AS COMPANIES CAPITALIZE ON CUSTOMER DATA

    Feb 06, 2019

    There is a growing disconnect between how companies capitalize on customer data and how consumers expect their data to be used, a new report from RSA Security has discovered. The firm polled more than 6000 individuals across France, Germany, the United Kingdom and United States to explore the nuance...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59305930

    BANK IT MANAGER GETS 10 YEARS FOR ATM EXPLOIT

    Feb 06, 2019

    An IT developer at a Chinese bank has been jailed for over a decade after exploiting a vulnerability in its systems to withdraw more than $1m from ATMs. Qin Qisheng, 43, was a manager in Huaxia Bank’s technology development center in Beijing who spotted that a glitch in the lender’s core...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59315931

    MPS HIT BY PHISHING CAMPAIGN: REPORT

    Feb 06, 2019

    MPs have been targeted by a new phishing campaign after a government whip’s accounts were hacked, according to reports. Tory MP Mike Freer told BuzzFeed News that the "parliamentary authorities are currently investigating" following the incident. According to the report, dozens of MP...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59325932

    PASSWORD REUSE REMAINS A BARRIER TO SAFER INTERNET USE

    Feb 05, 2019

    The internet by default is not always safe, which is why Safer Internet Day on Feb. 5 exists—it’s a day to educate and remind users about the steps that should be taken to reduce cyber-security risks. But what are the unsafe things that users are doing online? Google conducted a study al...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59255925

    MOZILLA IMPROVES PRIVACY, SECURITY IN FIREFOX 65

    Feb 05, 2019

    Today’s topics include Mozilla improving privacy controls in Firefox 65, and IBM warning of an Apple Siri Shortcut risk. Mozilla released its first web browser update for 2019 on Jan. 29, with the debut of Firefox 65, which improves a number of features and advances user privacy as part of Moz...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59265926

    HOME IMPROVEMENT SITE HOUZZ SUFFERS DATA BREACH

    Feb 04, 2019

    Home improvement site Houzz has announced a data breach affecting an unspecified number of customers, but claimed that follow-on identity theft is “highly unlikely.” The firm — which claims to have over 40 million homeowners, home design enthusiasts and home improvement professiona...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59195919

    ALEXA 500 SITES TARGETED WITH ADAPTIVE MALWARE

    Feb 04, 2019

    A malicious campaign has been targeting premium publishers using malvertising that looks like legitimate ads for popular retailers, according to The Media Trust. Researchers today published a blog post explaining that a large-scale malicious campaign attempted to exploit 44 adtech vendors with the u...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59205920

    ORANGE’S CYBERDEFENSE UNIT GETS A LEG UP WITH SECUREDATA PURCHASE

    Feb 01, 2019

    Orange today acquired the U.K.-based security company SecureData for an undisclosed amount. This purchase is part of the global provider’s bigger push to boost its Cyberdefense unit. The independently operated SecureData has offered managed security services for over 25 years. The company says...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=59135913

    HOW TO GET THE MOST OUT OF ENTERPRISE KNOWLEDGE ASSETS USING SEARCH

    Feb 01, 2019

    The demise of the Google Search Appliance (announced in early 2016) marked the end of the flawed dream of off-the-shelf, one-size-mostly-fits-all enterprise search solutions. In its place is the promise of rich search-based applications that can search, explore and analyze enterprise information. Kn...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59145914

    DELL FOUR-WAY ENDPOINT SECURITY PLAY TARGETS THE MID-MARKET

    Jan 31, 2019

    Dell launched its SafeGuard and Response as a four-level approach to endpoint security aimed at the mid-market. It’s also the second significant endpoint security announcement made this week. SafeGuard and Response includes elements from Secureworks and CrowdStrike, who are partnering on the o...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=59155915

    NEW UK FRAUD RULES SET TO EMPOWER VICTIMS

    Jan 31, 2019

    New rules come into force in the UK today designed to provide consumers with stronger powers of redress in the event they fall victim to authorized push payment (APP) fraud. Regulator the Financial Conduct Authority (FCA) has mandated that fraud victims can now complain to the bank that receives fun...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59065906

    WHY U.S. FIRMS ARE LESS CYBER-SECURE THAN THEY THINK

    Jan 31, 2019

    The U.S. certainly is a divided nation around many issues right now, but concern about cybersecurity as a threat to a majority of U.S. enterprises isn’t one of them. Everybody agrees on that one. A majority of participants in a recent survey enabled by FICO understand and recognize the risk of...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59075907

    US LAUNCHES MAJOR EFFORT TO DISRUPT NORTH KOREAN BOTNET

    Jan 31, 2019

    The US authorities have begun notifying victims of a notorious botnet run by North Korean state-sponsored hackers, as their efforts to disrupt the hermit nation's malicious activity increase. A court order allowed the FBI and officers from the US Air Force Office of Special Investigations (AFOSI...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59085908

    LARGEST DDOS ATTACK SENT OVER 500 MILLION PACKETS PER SECOND

    Jan 30, 2019

    A distributed denial-of-service (DDoS) attack discovered by Imperva had unleashed more than 500 million packets per second (Mpps), which is believed to be the largest packets-per-second (PPS) attack on record. According to research released today, last year’s DDoS attack on GitHub rang in at 1...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58995899

    FACETIME SECURITY FLAW GIVES APPLE A BLACK EYE: ANALYSTS

    Jan 30, 2019

    Apple's FaceTime video chat app remained out of service Wednesday morning after being temporarily disabled by the company Jan. 28 due to a security flaw that can enable a caller to hear audio from the receiver's end before the call is accepted. That's not supposed to happen, and not only...

    EWEEK
    READ MORE

    /news-article.aspx?ID=59005900

    THIRD-PARTY BREACHES PLAGUE MULTIPLE INDUSTRIES

    Jan 30, 2019

    From January 25 to 28, 2019, multiple organizations, including Discover Financial Services, Verity Medical Foundation, Verity Health Systems and Allen Chern LLP, have made routine filings in accordance with California state law, reporting cybersecurity incidents that may or may not be data breaches,...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=59015901

    SALT SECURITY LAUNCHES API PROTECTION PLATFORM

    Jan 29, 2019

    Startup Salt Security announced its API Protection Platform on Jan. 29, providing organizations with advanced capabilities to help discover, prevent and then remediate API attacks. Application programming interfaces (APIs) are commonly used in modern infrastructure, enabling a way to extend and inte...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58925892

    US TURNS UP HEAT ON HUAWEI WITH 23-COUNT INDICTMENTS

    Jan 29, 2019

    The US Department of Justice has unsealed charges against Huawei and its CFO covering separate alleged conspiracies to break sanctions on Iran and to steal trade secrets from T-Mobile USA. The charges were widely expected, but will do nothing to warm relations between the world’s superpowers a...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58935893

    INFO-STEALING FORMBOOK RETURNS IN NEW CAMPAIGN

    Jan 29, 2019

    A file-hosting service registered within the last week is being used to spread information-stealing malware in another FormBook campaign, currently attacking retail and hospitality businesses both within and outside of the US, according to Deep Instinct. Though FormBook has been around since approxi...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58945894

    TAXPAYERS DEMAND HMRC DELETES VOICE IDS

    Jan 28, 2019

    Over 160,000 UK taxpayers have demanded that the HMRC delete biometric voice recordings collected without their informed consent. Big Brother Watch has been running a campaign into the tax office’s use of a voice identification system, first launched in 2017. Having captured biometric data on ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58855885

    WHITE HAT BALL 2019 RAISES £193,000 FOR NSPCC’S CHILDLINE SERVICE

    Jan 28, 2019

    A staggering 193,000 was raised for counselling service Childline at the White Hat Ball last Friday, January 25. The annual fundraising event, organized by a committee of dedicated volunteers from the information security sector and now in its 14th year, was held at London’s Lancaster Hotel. T...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58865886

    ICO WARNS UK TO PREPARE FOR BREXIT "NO DEAL" DATA FLOWS

    Jan 28, 2019

    The UK’s privacy regulator has warned businesses to prepare now for a potential Brexit 'no deal,' claiming they may have to put in place standard contractual clauses to ensure unhindered data flows. With Theresa May’s government still refusing to rule out the prospect of allowing...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58875887

    CONSUMERS TERRIFIED AFTER HACKERS WORM INTO NESTS

    Jan 25, 2019

    Multiple consumers have reported being terrified after hackers infiltrated the Nest cameras in their homes, with one malicious actor making claims of a North Korean missile threat, according to CBS News. California resident Laura Lyons reported that malicious actors gained control of her Nest securi...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58785878

    HPE TARGETS GIRL SCOUTS FOR NEXT-GEN WHITE HATS

    Jan 24, 2019

    A new cybersecurity curriculum targeting junior Girl Scouts aged 9-11 aims to shift the image of the young girls in green from cookie distributors to cyber defenders, according to news from Hewlett Packard Enterprise (HPE). HPE has teamed up with the Girl Scouts to launch a cybersecurity education p...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58795879

    UK PUBLIC: DRONES ARE NATIONAL SECURITY RISK

    Jan 24, 2019

    The British public is dead-set against the use of drones, with the vast majority believing that as they continue to represent a national security risk and that cyber experts must do more to mitigate the threat from above. Think tank Parliament Street polled 2000 members of the public to compile its ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58805880

    WHAT WE LEARNED FROM MALWARE ATTACKS IN 2018

    Jan 23, 2019

    Malware blossomed in several different directions in the past 12 months, and the year ahead looks like it will be a full-fledged follow-on. According to security firm Malwarebytes, 2018 came in like a lion and out like—well, a different lion. It’s fair to say that, despite a sleepy secon...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58715871

    DHS EMERGENCY DIRECTIVE LOOKS TO BLOCK IRANIAN DNS THREAT

    Jan 23, 2019

    The US Department of Homeland Security (DHS) has taken the unusual step of issuing an emergency directive demanding government agency take urgent action to protect DNS infrastructure, in response to a major attack campaign. The Mitigating DNS Infrastructure Tampering directive was issued by the Cybe...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58725872

    SECURITY BOFFINS BLOCK 100K MALICIOUS SITES IN 10 MONTHS

    Jan 23, 2019

    Hundreds of security researchers have come together in a global non-profit project, working to take down 100,000 malicious websites in just 10 months. Revealed on Monday, the stats are testament to the power of information sharing among the information security community and hosting providers, when ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58735873

    ACTIVE CYBER DEFENCE SHOULD BE ROLLED OUT UK-WIDE: REPORT

    Jan 22, 2019

    The UK government’s highly successful Active Cyber Defence (ACD) program should be rolled out across other sectors to improve national cybersecurity, and could even be spurred by the government naming and shaming laggards, according to a new report. The Cyber Security Research Group at King&rs...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58625862

    VARONIS ADDS INCIDENT RESPONSE PLAYBOOKS TO DATA SECURITY PLATFORM

    Jan 22, 2019

    Varonis Systems announced version 7.0 of its Data Security Platform on Jan. 22, providing organizations with new capabilities to detect and respond to threats in the cloud and on-premises. The Varonis Data Security Platform 7.0 update adds new risk dashboards that can help to highlight potential iss...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58645864

    PRIORITIZING VULNERABILITIES IS KEY TO PATCHING SUCCESS, REPORT FIND

    Jan 22, 2019

    There is no shortage of software vulnerabilities but not all flaws have equal severity, and only a subset are essential to patch immediately. That's one of the core themes from a report released by Kenna Security and the Cyentia Institute on Jan. 22, titled, Prioritization to Prediction: Getting...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58655865

    SERVERS GRAB CLIENT FILES VIA MYSQL DESIGN FLAW

    Jan 22, 2019

    Attackers can potentially run a malicious MySQL server and gain access to connected data, according to a new security alert. MySQL has issued a security notice resulting from issues with the LOAD DATA LOCAL, noting that the “statement can load a file located on the server host, or, if the LOCA...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58665866

    SECURITY VC FUNDING HIT RECORD $5.3 BILLION IN 2018

    Jan 21, 2019

    It’s official. Cybersecurity venture capital funding hit a record $5.3 billion in 2018, according to Strategic Cyber Ventures. This is 20 percent higher than the $4.4 billion companies raised in 2017 and 81 percent higher than in 2016. But, as the VC firm warns, “this rate of investment ...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=58575857

    TREND MICRO'S ZDI LOOKS TO ACQUIRE MORE VULNERABILITIES IN 2019

    Jan 18, 2019

    2018 was a big year for security vulnerabilities, and 2019 is on track to be even bigger, according to Trend Micro's Zero Day Initiative. ZDI is in the business of acquiring vulnerabilities from security researchers and then responsibly reporting them to vendors. In 2018, ZDI published 1,444 sec...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58485848

    NEW MALWARE STRAIN CAN EVADE AND UNINSTALL CLOUD SECURITY SOFTWARE, RESEARCHERS WARN

    Jan 18, 2019

    The good news: your organisation has finally gotten around to installing some top of the range cloud security tools. The bad news: malware has been developed which can evade detection from them. The nefarious discovery from threat actor Rocke was made by Palo Alto Networks Unit 42, with the security...

    CLOUD COMPUTING
    READ MORE

    /news-article.aspx?ID=58495849

    CYBEATS RELEASES IOT SECURITY, MONITORING APP ON PALO ALTO NETWORKS FRAMEWORK

    Jan 18, 2019

    IoT security startup Cybeats announced that its IoT monitoring and security app, deemed IoT Radar, is now available on the Palo Alto Networks Application Framework. This news comes about a month after the startup raised $3 million in a seed round. Cybeats is a Toronto-based company that was founded ...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=58505850

    MICROSOFT ADDS AZUREDEVOPS BUG BOUNTY, OFFERS $20K REWARDS

    Jan 18, 2019

    Microsoft added a new bug bounty program that pays hackers to find security flaws in its software. This latest move targets Azure DevOps, Microsoft’s cloud platform for collaborating on code development. The program will pay between $500 and $20,000 for found eligible vulnerabilities in Azure ...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=58565856

    ATTACKERS TAKE NEW APPROACH TO INSTALLING CRYPTOMINERS

    Jan 17, 2019

    Security technology on cloud servers is supposed to help block and prevent the installation of malware, but what happens when attackers figure out how to uninstall security technology as part of a hacking campaign? According to a report released on Jan. 17 by Palo Alto Networks' Unit 42 security...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58405840

    WHY ENTERPRISES NEED TO CRACK DOWN ON LAZY LOGINS

    Jan 17, 2019

    Everybody does it. You do it. It’s the easy way out, but it’s also an easy way to a security blunder. The “it” in this case is using your email address as your user name for websites and other places where a login is necessary. Chances are you use one of a couple email addres...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58415841

    RESEARCHERS FIND 87GB TROVE OF BREACHED LOG-INS

    Jan 17, 2019

    A leading security researcher has warned of a major trove of breached data being shared on hacking sites, containing over 772 million unique email addresses and more than 21 million unique passwords. Troy Hunt, owner of the Have I Been Pwned (HIBP) breached credentials site, explained that he was al...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58425842

    IOT SECURITY MARKET SET TO GROW OVER 25 PERCENT ANNUALLY

    Jan 16, 2019

    A report predicts a growth rate of over 25 percent annually in the North American IoT security market. The market was valued at $1.7 billion in 2018 and is expected to reach $5.2 billion by 2023 at a compound annual growth rate (CAGR) of 25.1 percent, according to the report ‘Internet of Thing...

    IOT TECH NEWS
    READ MORE

    /news-article.aspx?ID=58335833

    IT TEAMS HAVE ONE YEAR TO MOVE OFF WINDOWS 7

    Jan 16, 2019

    The UK’s National Cyber Security Centre (NCSC) has urged organizations still on Windows 7 to plan now for the end of extended support in a year’s time. The GCHQ arm reminded IT managers that the operating system will no longer receive free updates from January 14 2020. That will mean any...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58345834

    LIONBRIDGE AUGMENTS ARTIFICIAL INTELLIGENCE OFFERING THROUGH ACQUISITION OF GENGO AND GENGO.AI

    Jan 16, 2019

    Today, Lionbridge, one of the world’s most trusted global communications platforms, announced its acquisition of Gengo, a Tokyo-based, leading edge technology company providing crowdsourcing, machine learning and localization services to global customers. Lionbridge has a 20-year history of le...

    SOURCE
    READ MORE

    /news-article.aspx?ID=68176817

    LESS THAN HALF OF BUSINESSES ARE ABLE TO DETECT IOT DEVICE BREACHES

    Jan 15, 2019

    A study conducted by Dutch software firm Gemalto reveals that only 48% of the businesses in the world are able to detect if any of their IoT devices suffers a breach. The survey, which was conducted among 950 IT and business decision makers across the globe, found that organisations are urging gover...

    IOT TECH NEWS
    READ MORE

    /news-article.aspx?ID=58235823

    KARAMBA SECURITY: VEHICLES FACE 300,000 ATTACKS PER MONTH

    Jan 15, 2019

    The scale of cyberattacks on connected cars has been revealed by Karamba Security, and it makes for a rather concerning read. Karamba set-up automotive electronic control units (ECUs) through which it’s been attracting internet attacks. In the last three months, the ECUs have been subjected to...

    IOT TECH NEWS
    READ MORE

    /news-article.aspx?ID=58245824

    SYNOPSYS IMPROVES COVERITY STATIC APPLICATION SECURITY TESTING

    Jan 15, 2019

    Synopsys announced on Jan. 15 that a new version of its Coverity Static Application Security Testing (SAST) technology is now available, providing organizations with enhanced software vulnerability analysis capabilities. Static analysis is an approach where code is examined for potential risks and v...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58265826

    SIX BEST PRACTICES FOR INCREASING AWS SECURITY IN A ZERO TRUST WORLD

    Jan 15, 2019

    Amazon Web Services (AWS) reported $6.6B in revenue for Q3, 2018 and $18.2B for the first three fiscal quarters of 2018. AWS revenue achieved an impressive 46% year-over-year net sales growth between Q3, 2017 and Q3, 2018 and 49% year-over-year growth for the first three quarters of the year. AWS&rs...

    CLOUD COMPUTING
    READ MORE

    /news-article.aspx?ID=58325832

    TOP WEB HOSTING SERVICES HAVE MAJOR SECURITY FLAWS

    Jan 14, 2019

    Security researcher Paulos Yibelo tested five of the world's biggest web hosting services for flaws and unveiled that all five were vulnerable. Not just 'vulnerable', but in fact so flawed that data mining and account takeover wouldn't even require breaking a sweat. Roughly a dozen f...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=58255825

    MAJOR' GLOBAL CYBERATTACKS SURGED IN 2018

    Jan 14, 2019

    The number of 'significant' attacks jumped by more than 50 per cent in the last three years. ‘Significant’ cyberattacks, those targeting government agencies, defence companies and financial institutions, have grown by more than 50 per cent in the last three years. This is accordi...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=58165816

    LINUX'S SYSTEMD HIT WITH THREE SECURITY HOLES

    Jan 14, 2019

    Admins and DevOps working with Linux machines will want to keep an eye out for patches for a trio of security vulnerabilities affecting systemd, the system and service manager that's primarily tasked with deciding what programs run when Linux boots. Specifically, the vulnerabilities are in syste...

    ITPRO TODAY
    READ MORE

    /news-article.aspx?ID=58175817

    OPEN-SOURCE METASPLOIT FRAMEWORK 5.0 IMPROVES SECURITY TESTING

    Jan 14, 2019

    Among the most widely used tools by security researchers is the open-source Metasploit Framework, which has now been updated with the new 5.0 release. Metasploit Framework is penetration testing technology, providing security researchers with a variety of tools and capabilities to validate the secur...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58185818

    SOPHOS INTRODUCES LATERAL MOVEMENT PROTECTION TO XG FIREWALL TO STOP ADVANCING CYBERATTACKS

    Jan 13, 2019

    Sophos has announced that its next-generation Sophos XG Firewall now includes lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised network. The SophosLabs 2019 Threat Report discusses a rise in targeted ransomware. With the Sam...

    NETWORKS ASIA
    READ MORE

    /news-article.aspx?ID=58065806

    WHY QUANTUM-RESISTANT ENCRYPTION NEEDS QUANTUM KEY DISTRIBUTION FOR REAL SECURITY

    Jan 12, 2019

    The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods depend on a secret key that is used to encrypt and decrypt the information that’s being protected. Those keys are long, random—or, more likely, al...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58085808

    THE SECURITY CHALLENGES OF MOVING ERP TO THE CLOUD

    Jan 11, 2019

    Enterprise resource planning software is a business-critical application for many organizations, and when moving to the cloud from on-premises deployments, there are some key security concerns that need to be considered, according to a study from the Cloud Security Alliance. The CSA study, titled En...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58095809

    MONGODB INSTANCE LEAKS 200 MILLION CHINESE CVS

    Jan 11, 2019

    A huge MongoDB database containing detailed CVs for over 202 million individuals has been found exposed online. The unprotected MongoDB instance was found via a simple BinaryEdge or Shodan search and was left without any password protection, according to Bob Diachenko, director of cyber risk researc...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58105810

    REDDIT LOCKS DOWN ACCOUNTS AFTER SECURITY INCIDENT

    Jan 10, 2019

    A large number of Reddit users have been locked out of their accounts as a precaution while the site’s admins investigate potential unauthorized access. Staffer “Sporkicide” would not disclose exactly how many users were affected by the move, but claimed in a post yesterday that &l...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=58005800

    SAILPOINT TECHNOLOGIES: PRODUCT OVERVIEW AND ANALYSIS

    Jan 10, 2019

    SailPoint Technologies is an Austin, Texas-based provider of identity governance solutions, which is known to be one of the fastest-growing cybersecurity spending priorities. Founded in 2005, SailPoint holds a steadfast commitment to solving business problems with innovative identity governance solu...

    EWEEK
    READ MORE

    /news-article.aspx?ID=58075807

    FIREEYE UPDATES SERVER EMAIL SECURITY PLATFORM FOR ADVANCED THREATS

    Jan 09, 2019

    FireEye is updating its on-premises security capabilities with the launch of the FireEye Email Security - Server Edition 8.2 release on Jan. 9. The FireEye Email Security - Server Edition 8.2 provides organizations with new capabilities to detect advanced email threats, including executive impersona...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57915791

    WEB APPLICATION VULNERABILITIES CONTINUE TO GROW, IMPERVA REPORTS

    Jan 09, 2019

    2018 was not a good year for web application vulnerabilities, with 17,142 reported issues, according to a report released on Jan. 9 by Imperva. The 2018 tally for web application vulnerabilities represents a 21 percent year-over-year increase from 2017. There are multiple types of web applications v...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57925792

    SK TELECOM AIRS FIRST LIVE TV BROADCAST VIA 5G, CES 2019 TO SPOTLIGHT 5G

    Jan 09, 2019

    South Korean wireless telecommunications operator SK Telecom claims to have broadcast the world's first live television event over a commercial 5G network. SK Telecom used its 5G broadcasting solution dubbed 'T Live Caster' to air over entertainment channel 'XtvN' a New Year&rsqu...

    RF GLOBALNET
    READ MORE

    /news-article.aspx?ID=57935793

    MICROSOFT KICKS OFF 2019 WITH MEDIUM PATCH LOAD

    Jan 09, 2019

    Microsoft started the new year yesterday by issuing fixes for a near half century of vulnerabilities, although only seven were rated critical. Many of these were remote code execution (RCE) bugs, with experts agreeing that CVE-2019-0547 should be top of the priority list. This RCE vulnerability in t...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57965796

    PHONE CARRIERS SELLING CUSTOMER LOCATION DATA

    Jan 09, 2019

    Bounty hunters are able to leverage a somewhat dubious skeptical service available through major telecom companies, including T-Mobile, AT&T, and Sprint, according to Motherboard. A researcher reportedly paid $300 to a bounty hunter who was then able to geolocate a phone down to a location in a ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57975797

    NHS DIGITAL CISO QUITS AFTER THREE MONTHS

    Jan 09, 2019

    NHS Digital’s first chief information security officer (CISO) has resigned just three months into the job, dealing a blow to efforts to improve cybersecurity across the UK’s health service. In a memo to staff seen by HSJ, NHS Digital deputy CEO, Rob Shaw, said that Robert Coles’ de...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57985798

    FIRM OFFERS $2M FOR IOS ZERO-DAY EXPLOITS

    Jan 09, 2019

    ontroversial exploit broker Zerodium has upped its bug bounties for the majority of desktop/server and mobile exploits, offering security researchers millions of dollars for their work. At the lower end, a Windows local privilege escalation or sandbox escape will now pay out $80,000, up from $50,000...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57995799

    IBM GROWS PATENT PORTFOLIO WITH CYBER-SECURITY INNOVATIONS

    Jan 08, 2019

    IBM announced on Jan. 8 that it was awarded 9,100 patents in 2018, once again topping the list for the most U.S. patents granted in a given year. A core component of IBM's patent haul in 2018 was in cyber-security innovation, with more than 1,400 granted patents. Among the security patents grant...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57815781

    ELECTION SECURITY BILLS FINALLY PROGRESSING IN CONGRESS

    Jan 08, 2019

    After years of contention about real and imagined security attacks on U.S. elections, the U.S. House of Representatives is expected to consider and then pass H.R. 1, also known as the “For the People Act of 2019,” which includes provisions that would improve election security and help st...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57825782

    FOUR CLOUD SECURITY PREDICTIONS FOR 2019: CONTAINERISATION, LOAD BALANCERS, AND MORE

    Jan 08, 2019

    The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While many companies had previously been afraid of making the move, as the open nature of the cloud makes it...

    CLOUD COMPUTING
    READ MORE

    /news-article.aspx?ID=57835783

    ESCALATING VALUE OF IOS BUG BOUNTIES HITS $2M THRESHOLD

    Jan 08, 2019

    In the escalating market for security vulnerabilities a new milestone has been recorded early in the new year, with $2 million now being offered for a remote Apple IOS exploit. The $2 million award is being offered by vulnerability acquisition firm Zerodium, which first achieved global notoriety for...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57845784

    YOUR SOCIAL MEDIA FORECAST FOR YEAR 2019 IS HERE AND IT’S NOT BUSINESS AS USUAL

    Jan 08, 2019

    Guest Post from Peter Davidson, a senior business associate striving to help different brands and startups to make effective business decisions and plan effective business strategies. After the successful conclusion of 2018, you must be planning with full energy to take your business to new heights ...

    IRISH TECH NEWS
    READ MORE

    /news-article.aspx?ID=57855785

    HOW MASTERCARD IS IMPROVING FRAUD DETECTION WITH IDENTITY CHECK

    Jan 07, 2019

    Online credit card fraud is a major concern for enterprises, consumers and vendors alike. One of the biggest brands in the payment card space is Mastercard, which has been quietly working on implementing technology it has branded Mastercard Identity Check, in an effort to help reduce fraud, while ma...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57715771

    PROTEGO LABS BOOSTS SERVERLESS SECURITY WITH OPEN-SOURCE PROJECT

    Jan 07, 2019

    While serverless technology is becoming increasingly widely used, there has been a lack of understanding when it comes to serverless security implications. That's a challenge that Protego Labs is looking to help solve with the release of a freely available open-source tool that helps organizatio...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57725772

    SECURING ENTERPRISE CROWN JEWELS: HOW TO PROTECT DATA AT DB LEVEL

    Jan 07, 2019

    Data breaches once again played a prominent role in this past year’s media coverage. While many organizations make it seem like an unavoidable fact, the reality is that there are a plenty of things that enterprises can do right now to help prevent unauthorized access to their systems and data....

    CYBER SECURITY NEWS, CYBER-ATTACK NEWS, DATA SECURITY NEWS, CLOUD SECURITY NEWS, NETWORK SECURITY NEWS, ANTIVIRUS NEWS
    READ MORE

    /news-article.aspx?ID=57735773

    THOUSANDS COMPLAIN ABOUT TV LICENSE PHISHING EMAILS

    Jan 07, 2019

    A highly convincing phishing email spoofed to appear as if sent from the UK’s TV Licensing authority has accrued thousands of complaints over the past three months. Action Fraud warned back in October that the scam email was designed to steal a user’s personal and financial details. &ldq...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57745774

    LA CITY SUES WEATHER APP OVER DATA COLLECTION

    Jan 07, 2019

    The City of Los Angeles has filed a lawsuit against a popular US-based weather app, alleging it illegally sells user data to third parties. LA city attorney, Mike Feuer, is claiming the Weather Channel app misled users in that most agreed to allow it access to their location data purely for personal...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57755775

    A LOOK BACK AT THE ISRAELI CYBER SECURITY INDUSTRY IN 2018

    Jan 04, 2019

    2018 saw a spate of major cyber attacks including the hacks of British Airways, Facebook and Marriott. Despite growing emphasis on and awareness of cyber threats, large organizations continue experiencing massive data breaches. And as the world becomes increasingly connected (cars and medical device...

    TECHCRUNCH
    READ MORE

    /news-article.aspx?ID=57625762

    MARRIOTT REVEALS NEW DETAILS IN STARWOOD DATA BREACH

    Jan 04, 2019

    Marriott International disclosed revised information on Jan. 4 about the massive data breach involving its Starwood Hotels division. The update includes both good and bad news about the impact from the data breach. First the good news: Originally Marriott reported on Nov. 30, 2018, that information ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57635763

    NEUSTAR BOLSTERS FRAUD DETECTION CAPABILITIES WITH TRUSTID

    Jan 04, 2019

    Neustar is improving its security capabilities with the addition of technology gained via the acquisition of caller authentication and fraud prevention vendor Trustid. Fraud can take many different forms, including caller fraud where unauthorized individuals attempt transactions or information retri...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57645764

    BIOMETRIC SECURITY CAN BE HACKED, BUT IT'S REALLY HARD TO DO

    Jan 04, 2019

    At the end of December 2018, security researchers in Leipzig, Germany, demonstrated at a security conference their method of hacking a biometric security system that depends on reading the pattern of blood vessels in the palm of the hand. This method of vein authentication involves reading the detai...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57655765

    PREDICTIONS 2019: SECURITY THREATS WILL ONLY GET NASTIER

    Jan 03, 2019

    Hardly a week went by in 2018 without news of a major data leak or security breach. Ransomware and phishing were invasive, state-run hackers were working around the clock, passwords were leaking, new sophisticated malware attacks were spreading, data was breached and governments around the world onc...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57515751

    HACKERS THREATEN TO RELEASE 9/11 DATA 'TROVE'

    Jan 03, 2019

    A notorious hacking group is claiming to have put up for sale stolen legal and other documents relating to the 9/11 terrorist attacks. The individual(s) known as ‘The Dark Overlord’ claimed in a lengthy Pastebin notice to have hacked insurance giants Hiscox Syndicates and Lloyds of Londo...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57525752

    PASSWORD MANAGER USERS EXPOSED AFTER PRIVACY SNAFU

    Jan 03, 2019

    Data on over two million users of a password manager tool has been publicly exposed in another cloud storage misconfiguration incident. Abine said on Monday that 2.4 million users of its Blur product from prior to January 6 2018 were affected. As well as password management, it offers the ability to...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57535753

    RANSOM DEMAND ON LUAS WEBSITE LIKELY THE FIRST OF MANY IN 2019

    Jan 03, 2019

    With the website of Dublin’s tram service, Luas, down after an apparent cyber attack, one of the country’s leading cyber security firms is urging businesses and the public to ensure their computers have the protection they need against an increasing number or ransomware attacks. A messag...

    IRISH TECH NEWS
    READ MORE

    /news-article.aspx?ID=57545754

    CASTHACK EXPOSES GOOGLE CHROMECAST DEVICE USERS TO RISK

    Jan 03, 2019

    A pair of hackers have taken aim at vulnerable Google Chromecast media streaming devices, sending unauthorized content and messages to unsuspecting users. The attack, dubbed "CastHack," identifies Google Chromecast devices that have been exposed to the public internet. The two attackers, w...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57605760

    HACKERS HIJACK 70,000 GOOGLE CHROMECASTS THROUGH BUG – ALTHOUGH CHROMECAST WASN’T NONE THE WISER

    Jan 03, 2019

    It was reported earlier today that Hacker Giraffe has remotely gained access to the TVs and smart devices of tens-of-thousands of Google Chromecast users. In the hack, a pop-up was displayed that both warns of the exploit and links to a page listing the current number of affected devices. The messag...

    IRISH TECH NEWS
    READ MORE

    /news-article.aspx?ID=57615761

    HACKERS TARGET NORTH KOREAN DEFECTORS

    Jan 02, 2019

    Personally identifiable information (PII) on nearly 1000 defectors from North Korea has been stolen in a cyber-raid, the South Korean government revealed late last week. It’s believed that one of the 25 “Hana” support centers for defectors in the country was targeted by a classic p...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57415741

    HOW ENTERPRISES CAN AVOID THE RYUK RANSOMWARE WITH RIGHT STRATEGY

    Jan 02, 2019

    During the holiday period between Christmas and New Year’s in 2018, workers at a Tribune Co. newspaper location in South Florida found out that they couldn’t upload late-breaking sports scores to the portion of their CMS that handles printing and distribution. Later, other newspapers in ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57425742

    VIETNAM'S NEW CYBER LAW THREATENS FREE SPEECH

    Jan 02, 2019

    The Vietnamese government has passed a sweeping new cybersecurity law which critics claim will help the one-party state continue to crack down on free speech. The law will force internet companies like Facebook and Google to open offices in the country, store data on users locally and allow access t...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57435743

    USB TYPE-C TO BECOME MORE SECURE WITH AUTHENTICATION STANDARD

    Jan 02, 2019

    The security of USB-based connections and devices is taking a step forward, with the official launch of the USB Type-C Authentication Program on Jan. 2. USB devices have become ubiquitous in modern computing, and in recent years USB Type-C has been introduced on leading notebooks, smartphones and ot...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57445744

    HACKER HIJACKS THOUSANDS OF CHROMECASTS AND SMART TVS TO PLAY PEWDIEPIE AD

    Jan 02, 2019

    A hacker duo claims to have hijacked thousands of internet-exposed Chromecasts, smart TVs, and Google Home devices to play a video urging users to subscribe to PewDiePie's YouTube channel. The main hacker behind this hacking campaign --codenamed CastHack-- is known online as TheHackerGiraffe. Th...

    ZDNET
    READ MORE

    /news-article.aspx?ID=57455745

    EU TO RUN BUG BOUNTY PROGRAMS FOR 14 FREE SOFTWARE PROJECTS

    Jan 02, 2019

    The European Union is offering a total of more than €850,000 – nearly $1 million – for vulnerabilities found in 14 widely used free and open source software projects. The announcement was made last week by Julia Reda, who represents the German Pirate Party in the European Parliament...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=57345734

    FRENCH STARTUP OFFERS DARK WEB COMPASS, BUT NOT FOR EVERYONE

    Dec 31, 2018

    For years criminal websites shrouded in secrecy have thrived beyond the reach of traditional search engines, but a group of French engineers has found a way to navigate this dark web -- a tool they don't want to fall into the wrong hands. "We insist on this ability to say 'no',"...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=57355735

    WHAT TO CONSIDER BEFORE DEVELOPING AN API SECURITY STRATEGY

    Dec 31, 2018

    Recent incidents at Salesforce, Facebook, Google+—not to mention the Equifax breach and the Cambridge Analytica scandal that plagued Facebook—point directly to the unsettling reality that API security is often an afterthought for enterprises. Such incidents serve as a major wake-up call ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57315731

    LOOKING BACK AT THE TOP CYBER-SECURITY INCIDENTS OF 2018

    Dec 31, 2018

    As 2018 draws to a close, it's a good time to reflect on the year that was in cyber-security, to learn from past mistakes and identify trends that will likely continue into the new year. 2018 saw no shortage of major breaches, new critical vulnerabilities and policy changes that enterprise IT or...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57335733

    WHAT ENTERPRISES CAN EXPECT FOR CYBERSECURITY IN 2019

    Dec 28, 2018

    2018 was a banner year in cybersecurity. The breaches were many, the remedies were few, and the cost of doing nothing went up. But there is hope on the horizon as new methods of authentication are beginning to show up, old practices are discarded, and as the threat landscape becomes clearer. But the...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57325732

    CISCO PATCHES A CRITICAL PATCH ON ITS SOFTWARE-LICENSE MANAGER

    Dec 27, 2018

    Cisco this week said it patched a “critical” patch for its Prime License Manager (PLM) software that would let attackers execute random SQL queries. The Cisco Prime License Manager offers enterprise-wide management of user-based licensing, including license fulfillment. Released in Novem...

    COMPUTERWORLD
    READ MORE

    /news-article.aspx?ID=57235723

    CYBERSECURITY 101: HOW TO PROTECT YOUR CELL PHONE NUMBER AND WHY YOU SHOULD CARE

    Dec 25, 2018

    Assuming you have your strong passwords in place and your two-factor authentication set up, you think your accounts are now safe? Think again. There’s much more to be done. You might think your Social Security or bank account numbers are the most sensitive digits in your life. Nowadays, hacker...

    TECHCRUNCH
    READ MORE

    /news-article.aspx?ID=57215721

    OVER 19,000 ORANGE MODEMS ARE LEAKING WIFI CREDENTIALS

    Dec 24, 2018

    Over the weekend, a security researcher has discovered that nearly 19,500 Orange Livebox ADSL modems are leaking WiFi credentials. Troy Mursch, co-founder of Bad Packets LLC, says his company's honeypots have detected at least one threat actor scanning heavily for Orange modems. Scans started Fr...

    ZDNET
    READ MORE

    /news-article.aspx?ID=57245724

    NEARLY 20,000 ORANGE MODEMS LEAKING WI-FI PASSWORDS

    Dec 24, 2018

    Nearly 20,000 Orange modems are being targeted thanks to a vulnerability leaking their SSID and Wi-Fi passwords, researchers at Bad Packets have warned. The firm’s honeypots first picked up the attack traffic targeting Orange Livebox ADSL modems. After conducting a simple Shodan search, chief ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57155715

    RESEARCHER PUBLISHES PROOF-OF-CONCEPT CODE FOR CREATING FACEBOOK WORM

    Dec 22, 2018

    A Polish security researcher has published today details and proof-of-concept code that could be used for creating a fully functional Facebook worm. This code exploits a vulnerability in the Facebook platform that the researcher --who goes online under the pseudonym of Lasq-- has seen being abused i...

    ZDNET
    READ MORE

    /news-article.aspx?ID=57255725

    CYBER-PHYSICAL CONVERGENCE EXPANDS ATTACK SURFACE

    Dec 21, 2018

    In the last year, Hong Kong has seen the growing convergence of IT systems and OT systems as more companies try to drive digital transformation deeper into their organization. “The cyber-physical convergence, especially on the use of IoT (Internet of Things), is actually happening and keeps gr...

    COMPUTERWORLD
    READ MORE

    /news-article.aspx?ID=57225722

    PRIVACY LEGISLATION MIGHT HAVE STOPPED FACEBOOK

    Dec 20, 2018

    In the aftermath of an extensive New York Times investigation into Facebook’s data privacy regulations and whether the company violated the privacy and public policy regulations of the Federal Trade Commission, Sen. Amy Klobuchar (Minn.) said that it is time for her colleagues to step up. Duri...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57035703

    PIVOTAL CLOUD FOUNDRY 2.4 BOOSTS SECURITY WITH COMPLIANCE SCANNER

    Dec 20, 2018

    Pivotal is releasing version 2.4 of its Pivotal Cloud Foundry (PCF) platform on Dec. 20, providing organizations with a host of new capabilities to manage and deploy cloud-native applications. PCF is Pivotal's commercial distribution, based on the open-source Cloud Foundry project, which provide...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57045704

    MICROSOFT PATCHES OUT-OF-BAND ZERO-DAY SECURITY FLAW FOR IE

    Dec 20, 2018

    Users of Microsoft's Windows operating system have grown accustomed to a regular, predictable cadence for patches—on the first Tuesday of every month. On Dec. 19, Microsoft broke that cadence with an emergency out-of-band update for its Internet Explorer (IE) web browser. The reason is sim...

    EWEEK
    READ MORE

    /news-article.aspx?ID=57055705

    MCAFEE: IOT MALWARE INCREASING ALONGSIDE 480 THREATS PER MINUTE

    Dec 20, 2018

    Shocking research from McAfee Labs highlights the increasing prevalence of IoT malware as the cybersecurity firm detects 480 new threats per minute. Years of putting functionality before security and rushing to market have led to many compromisable devices. The Mirai IoT botnet attack in 2016 was a ...

    IOT TECH NEWS
    READ MORE

    /news-article.aspx?ID=57115711

    US INDICTS CHINESE HACKERS IN MSP NETWORK SCHEME

    Dec 20, 2018

    The U.S. Justice Department today charged two Chinese-state-sponsored hackers that it says infiltrated managed service provider (MSP) networks and stole companies’ intellectual property and sensitive data. While the U.S. government didn’t name any of the companies whose networks were com...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=57125712

    NEW WAVE OF HMRC SCAM CALLS HITS UK

    Dec 20, 2018

    Security experts are warning of a new HMRC scam using a threatening automated message in a bid to trick taxpayers into paying a ‘fine.’ The scam calls appear designed to cash-in on the busy end-of-year period in the UK where taxpayers look to get their affairs in order before the self-as...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57015701

    CLICK2GOV BREACH PAYMENT CARDS SOLD ON DARK WEB

    Dec 19, 2018

    In August 2017, Click2Gov software, a payment technology widely used by local governments to process utility payments, was the victim of a breach in which Oceanside, California, was the first in a long line of compromised municipalities. Many of the payment cards stolen from the compromised records ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=57025702

    A RESTAURANT'S NEXT BIG FINANCIAL RISK ISN'T BAD REVIEWS — IT'S DATA BREACHES

    Dec 19, 2018

    As hackers find new ways to gather coveted personal information, restaurants are quickly becoming a target for the internet underworld. Several customer accounts were breached on Dunkin's DD Perks mobile rewards program in November, but Dunkin' certainly wasn't the only chain to get hit ...

    CIO DIVE
    READ MORE

    /news-article.aspx?ID=57135713

    FACEBOOK REPORTEDLY GATHERING PERSONAL DATA FROM TINDER, PREGNANCY+, OTHER APPS

    Dec 19, 2018

    Facebook may be gathering some of your most personal information. Android apps like Tinder, Grindr and Pregnancy+ are sharing sensitive user information with Facebook, according to a Wednesday report from German mobile security company Mobilsicher. The information reportedly includes dating profiles...

    CNET
    READ MORE

    /news-article.aspx?ID=57145714

    FINALLY, A MEANINGFUL CONGRESSIONAL REPORT ON STEMMING CYBERSECURITY ATTACKS

    Dec 12, 2018

    As a new Congress arrives next month, expect a whirlwind of activity on the cybersecurity and privacy fronts. From major data breaches to the growing consumer data privacy morass, the frenetic pace of Washington developments will heat up. Most of this activity will obscure the fundamentals of why we...

    CSO
    READ MORE

    /news-article.aspx?ID=56915691

    NEW VARIANT OF SHAMOON MALWARE UPLOADED TO VIRUSTOTAL

    Dec 12, 2018

    A new variant of the destructive Shamoon malware was uploaded to VirusTotal this week, but security researchers haven’t linked it to a specific attack yet. Also referred to as DistTrack, the sophisticated malware was initially observed in attacks against Saudi Arabian and other oil companies i...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56925692

    GRAMMARLY LAUNCHES PUBLIC BUG BOUNTY PROGRAM

    Dec 12, 2018

    Grammarly, the popular service for checking grammar and spelling, this week announced the launch of a public bug bounty program. Grammarly has been running a private bug bounty program with HackerOne for more than a year. The program has nearly 1,500 participants and resulted in payouts totaling $50...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56935693

    TOP 10 WORST PASSWORD FAILS OF 2018

    Dec 12, 2018

    The 2018 worst password fails, by that Dashlane means worst offenders this year, are: 1. Kanye West for unlocking his iPhone on TV in the White House with 000000. 2. The Pentagon for protecting weapon systems with default passwords, as well have having such pitiful admin passwords that the GAO audit...

    CSO
    READ MORE

    /news-article.aspx?ID=56945694

    AI SET TO SUPERCHARGE PHISHING IN 2019

    Dec 12, 2018

    The coming year will see a mix of old and new as phishing is supercharged with AI but reported vulnerabilities continue to cause organizations problems, according to Trend Micro. The security giant claimed in its predictions report this week that phishing will continue to grow in popularity as explo...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56955695

    ADOBE PATCHES 87 VULNERABILITIES IN ACROBAT SOFTWARE

    Dec 11, 2018

    The December 2018 Patch Tuesday updates released by Adobe address a total of 87 vulnerabilities affecting the company’s Acrobat software. The vulnerabilities impact the Windows and macOS versions of Acrobat and Acrobat Reader DC (Continuous and Classic 2015 tracks), and Acrobat and Acrobat Rea...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56825682

    WINDOWS KERNEL VULNERABILITY EXPLOITED IN ATTACKS

    Dec 11, 2018

    Microsoft’s Patch Tuesday updates for December 2018 address nearly 40 vulnerabilities, including a zero-day flaw affecting the Windows kernel. The actively exploited vulnerability, tracked as CVE-2018-8611, has been described by Microsoft as a privilege escalation issue related to the failure ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56835683

    RESEARCHERS FIND OVER 40,000 STOLEN LOGINS FOR GOVERNMENT PORTALS

    Dec 11, 2018

    Russian cybersecurity firm Group-IB discovered login credentials for over 40,000 accounts that unlock government services in more than 30 countries. The credentials were harvested via phishing attacks that distributed spyware tools such as Pony Formgrabber, AZORult, and Qbot. It is believed the logi...

    CSO
    READ MORE

    /news-article.aspx?ID=56845684

    NEW GOOGLE+ BUG MOVES SITE END DATE FORWARD

    Dec 11, 2018

    Google is speeding up the closure of its unpopular social networking platform after discovering a new bug affecting over 52 million users. The tech giant announced in October that it would be shutting Google+ in August 2019. However, that date has been brought forward to April next year, while its A...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56855685

    NEW MAC MALWARE COMBINES OPEN-SOURCE BACKDOOR AND CRYPTO-MINER

    Dec 10, 2018

    A recently discovered piece of malware targeting Mac systems is a combination of two open-source programs, Malwarebytes security researchers warn. Detected as DarthMiner, the threat is distributed through an application called Adobe Zii, which supposedly helps in the piracy of various Adobe programs...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56715671

    NEW BUG PROMPTS EARLIER END TO GOOGLE+ SOCIAL NETWORK

    Dec 10, 2018

    Google said Monday it will close the consumer version of its online social network sooner than originally planned due to the discovery of a new software bug. The Google+ social network will close in April -- four months earlier than planned -- and the internet giant will focus on operating a version...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56725672

    RESEARCHERS FIND A DOZEN UNDOCUMENTED OPENSSH BACKDOORS

    Dec 10, 2018

    ESET security researchers have discovered 12 new OpenSSH backdoor families that haven’t been documented before. The Secure Shell (SSH) network protocol allows the remote connection of computers and devices. The portable version of OpenSSH is implemented in almost all Linux distributions, and a...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56735673

    HOW GOOGLE IS IMPROVING KUBERNETES CONTAINER SECURITY

    Dec 10, 2018

    The open-source Kubernetes container orchestration project has become increasingly important in recent years as organizations rely on it to deploy applications. With the increased reliance has come increased scrutiny on security, especially at Google, which hosts a managed Kubernetes service called ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56745674

    SOPHOS CENTRAL INTEGRATES FIREWALL MANAGEMENT TO IMPROVE SECURITY

    Dec 10, 2018

    Sophos announced on Dec. 10 that it is bringing its XG Firewall to the Sophos Central Management service, enabling organizations to manage security in an integrated approach from a central management dashboard. The integrated capability is now available in early access for Sophos customers and will ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56755675

    DEEPPHISH PROJECT SHOWS MALICIOUS AI IS NOT AS DANGEROUS AS FEARED

    Dec 07, 2018

    Artificial intelligence (AI) is increasingly becoming a de facto necessity for cybersecurity. The asymmetric nature of cyberattacks simply overwhelms traditional manual analyst defenses, and organizations must increasingly use AI and machine learning (ML)-enhanced technologies to detect known attack...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56615661

    HOW OPEN POLICY AGENT WORKS TO SECURE CLOUD-NATIVE WORKLOADS

    Dec 07, 2018

    A core element of IT security is having proper policies in place that define what is and what isn't allowed for a given process or entity. In the cloud-native world, where there are multiple distributed elements that can live in different deployment modalities, the challenge of defining and impl...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56625662

    UK CONSUMERS HAVE LOST £500 EACH THROUGH ONLINE CRIME

    Dec 07, 2018

    Two-fifths of UK consumers have been a victim of cybercrime with phishing topping the list, according to new research from GMX. The email provider polled over 2000 Brits last month to better understand the impact and extent of online threats. It found that half of those netizens affected lost money ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56635663

    RESEARCHERS TAKE AN AI APPROACH TO TEXT CAPTCHAS

    Dec 07, 2018

    Researchers at Lancaster University in the UK and Northwest University and Peking University in China have found a way to get around CAPTCHA security with new artificial intelligence, according to research published in a paper titled Yet Another Text Captcha Solver: A Generative Adversarial Network ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56645664

    UNDER FIRE HUAWEI AGREES TO UK SECURITY DEMANDS: REPORT

    Dec 07, 2018

    Embattled Chinese telecoms giant Huawei has agreed to British intelligence demands over its equipment and software as it seeks to be  part of the country's 5G network plans, the FT reported Friday. Huawei executives met senior officials from Britain's National Cyber Security Centre (NCS...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56695669

    APPLE FIXES PASSCODE, REMOTE CODE EXECUTION FLAWS IN IOS AND MACOS

    Dec 06, 2018

    Apple released a series of updates on Dec. 5 to its desktop and mobile operating systems, patching serious vulnerabilities that could have exposed users to risk. Among the updates released by Apple are iOS 12.1.1, macOS Mojave 10.14.2 and Safari 12.0.2. The bugs fixed across the updates include priv...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56515651

    CENSYS TO EXPAND INTERNET SCANNING FOR THREAT HUNTING

    Dec 06, 2018

    Visibility is key for IT security professionals trying to figure out the nature of a given cyber-security threat. While having visibility into an organization's environment is one thing, having visibility into the entirety of the internet is another, which is where Censys fits in. Censys has its...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56525652

    BT STRIPS HUAWEI FROM 3G AND 4G CORE

    Dec 06, 2018

    BT and Huawei have sought to play down speculation that the former is stripping the Chinese telecoms giant’s equipment from its networks over security concerns. The UK telco group said it is removing Huawei infrastructure from its core 3G and 4G networks to meet existing policy, which will als...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56535653

    REPUBLICAN PARTY BREACHED IN MAJOR CYBER-ATTACK – REPORT

    Dec 06, 2018

    The chief campaign organization of the Republican Party has been hacked and thousands of emails from senior aides compromised over the period of several months, it has emerged. In an incident reminiscent of the notorious cyber-attack on the Democratic National Committee (DNC) ahead of the 2016 presi...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56545654

    GOOGLE PATCHES MORE THAN 50 ANDROID VULNERABILITIES IN DECEMBER

    Dec 06, 2018

    Google this week released a set of security patches for Android, to address over 50 vulnerabilities in the mobile operating system. The most severe of the security bugs is a critical issue in Media framework that could be exploited by remote attackers to execute arbitrary code within the context of ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56555655

    HACKERS GET INTO NATIONAL REPUBLICAN CONGRESSIONAL COMMITTEE'S EMAIL SYSTEM

    Dec 05, 2018

    “Thousands of emails were stolen” from four senior aides to the National Republican Congressional Committee (NRCC), the campaign arm for House Republicans, during the 2018 midterm campaign. MSSP first detected the hack and then CrowdStrike was brought into it in April to investigate the ...

    CSO
    READ MORE

    /news-article.aspx?ID=56815681

    BUSINESSES WARNED ON WINTER PHISHING SCAMS

    Dec 05, 2018

    Winter is phishing season, and organisations and individuals alike should be extra vigilant during the holidays. This is according to a new report from F5 Labs, which claims that fraud incidents in October, November, and December usually jump more than 50 per cent, compared to a yearly average. Most...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=56435643

    KUBERNETES HIT BY MAJOR SECURITY FLAW

    Dec 05, 2018

    A serious flaw in Kubernetes has been identified, and this one is so big that you should stop using it and update, immediately. Dubbed CVE-2018-1002105, the flaw allows anyone to establish a connection through the Kubernetes application programming interface (API) server to a backend server. Once co...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=56445644

    RUSSIAN HOSPITAL TARGETED WITH FLASH ZERO-DAY AFTER KERCH INCIDENT

    Dec 05, 2018

    Security updates released by Adobe on Wednesday for Flash Player patch two vulnerabilities, including a critical flaw exploited by a sophisticated threat actor in attacks aimed at a healthcare organization associated with the Russian presidential administration. The attack may be related to the rece...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56455645

    IOT BACKBONE IS RIDDLED WITH SECURITY ISSUES

    Dec 05, 2018

    Two popular IoT communications protocols are riddled with vulnerabilities and systemic issues which are exposing countless global organizations to industrial espionage, targeted attacks and DoS, according to Trend Micro. The security giant’s latest report, The Fragility of Industrial IoT&rsquo...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56465646

    GLOBAL SEARCH MARKETING AGENCY, DIRECTIVE, ANNOUNCES COMPLETE REBRANDING

    Dec 05, 2018

    Directive, the leading B2B and enterprise search marketing agency, announced today the launch of their new branding to reflect their evolution into a global search marketing agency. Directive’s unique approach to search marketing has positioned the company as the agency of choice for leading B...

    SOURCE
    READ MORE

    /news-article.aspx?ID=66356635

    HOUSE REPUBLICAN CAMPAIGN COMMITTEE WAS HACKED DURING 2018 ELECTION

    Dec 04, 2018

    The National Republican Congressional Committee was hacked during the 2018 US midterm elections. The breach, first reported by Politico, exposed thousands of emails to an unknown hacker. "The NRCC can confirm that it was the victim of a cyber intrusion by an unknown entity," Ian Prior, a s...

    CNET
    READ MORE

    /news-article.aspx?ID=56355635

    NEW RANSOMWARE DEMANDS PAYMENT OVER WECHAT PAY IN CHINA

    Dec 04, 2018

    Ransomware attacks may have dwindled since the destructive days of WannaCry and NotPetya last year, but a new one has struck mobile-centric China and it's asking for ransom through one of the country's most popular methods of payment. Over 20,000 computers have fallen victim to an unnamed ra...

    CNET
    READ MORE

    /news-article.aspx?ID=56365636

    MALWARE DROPPER SUPPORTS A DOZEN DECOY DOCUMENT FORMATS

    Dec 04, 2018

    A recently discovered malware dropper has the ability to use nearly a dozen decoy document file formats to drop various payloads, Palo Alto Networks security researchers warn. Dubbed CARROTBAT, the customized dropper is being used to deliver lures primarily pertaining to the Korean region, revolving...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56375637

    RUSSIAN RANSOMWARE BROKERS SCAM VICTIMS

    Dec 04, 2018

    Security researchers have discovered cybersecurity scammers in Russia are generating hundreds of thousands of dollars in profits by falsely claiming to be able to unlock encrypted files. Check Point explained that one ‘IT consultancy’ named Dr Shifro is promising customers it can help th...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56425642

    PHISHING CAMPAIGN DELIVERS FLAWEDAMMYY, RMS RATS

    Dec 04, 2018

    A new campaign delivering various remote access Trojans (RATs) is likely the work of a known Dridex/Locky operator, Morphisec security researchers warn. Dubbed Pied Piper, the campaign targets users in multiple countries and is likely operated by TA505, the threat group known to have orchestrated la...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56275627

    DATA BREACHES CAN SUCKER-PUNCH YOU. PREPARE TO FIGHT BACK

    Dec 03, 2018

    When a big data breach makes the news, there's one thing that can get lost in the noise -- the harm that hacking causes regular people like you. Experts tend to focus on the number of people whose records hackers stole, or whether the breached company could have prevented the hack. Those are imp...

    CNET
    READ MORE

    /news-article.aspx?ID=56285628

    CISCO, AT&T, INTEL PROMOTE BEST ANTI-BOTNET PRACTICES FOR COMPANIES

    Dec 03, 2018

    A new report recommends best practices for services providers, enterprises, and software and device manufacturers to protect against botnets and other automated distributed attacks. The Council to Secure the Digital Economy published the 2018 International Anti-Botnet Guide. It’s a trade assoc...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=56295629

    KNOWING VALUE OF DATA ASSETS IS CRUCIAL TO CYBERSECURITY RISK MANAGEMENT

    Dec 03, 2018

    Understanding the value of corporate assets is fundamental to cybersecurity risk management. Only when the true value is known can the correct level of security be applied. Sponsored by DocAuthority and based on Gartner's Infonomics Data Valuation Model, Ponemon Institute queried 2,827 professio...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56305630

    NSA EXPLOITS NOT SILENT BUT ETERNALLY PROBLEMATIC

    Nov 29, 2018

    It’s been over a year since patches to protect against the leaked NSA exploits were released, yet Akamai has published research revealing the continued use of the Eternal family of exploits with evidence of a new version of the UPnProxy vulnerability targeting unpatched computers behind the ro...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56195619

    DELL RESETS USER PASSWORDS AFTER WEBSITE ATTACK

    Nov 29, 2018

    Dell announced late on Nov. 28 that its Dell.com customer-facing website was the victim of a cyber-attack. The attack was apparently discovered by Dell on Nov. 9, with attackers taking aim at usernames, email addresses and passwords that had been cryptographically hashed. According to Dell, it has n...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56205620

    ATTACKERS KEEN ON AUTOMATED BROWSERS

    Nov 29, 2018

    Google Chrome has long been a popular web browser, but since the introduction of the headless mode functionality, the browser has grow in popularity not only among software engineers and testers but also with attackers, according to Imperva. According to recently published research, "Headless C...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56215621

    ATTACKERS RUN ON DUNKIN'S DD PERKS REWARDS

    Nov 29, 2018

    Boston-based Dunkin’, the brand formerly known as Dunkin Donuts, has released a warning to its customers stating that DD Perks reward account holders were potentially hacked by a third party in a credential-stuffing attack wherein hackers were trying to steal the rewards points to sell and tra...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=56225622

    INDUSTRY REACTIONS TO USPS EXPOSING USER DATA

    Nov 28, 2018

    Security blogger Brian Krebs revealed recently that an API used by the United States Postal Service (USPS) had a vulnerability that potentially exposed the data of 60 million customers. Krebs learned of the security hole from an unnamed researcher who had reported the issue to USPS over a year ago. ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56115611

    CYBER RISK EXCHANGE STARTUP CYBERGRX RAISES $30 MILLION

    Nov 28, 2018

    CyberGRX, a Denver, Colorado-based startup that has created what it calls a “global cyber risk exchange”, today announced that it has raised $30 million in Series C funding, bringing the total amount raised by the company to $59 million. Through its recently launched third-party cyber ri...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56125612

    IBM BRINGS ENHANCED DATA MODELS TO QRADAR ADVISOR WITH WATSON 2.0

    Nov 28, 2018

    IBM announced on Nov. 28 that it is expanding the capabilities of its QRadar Advisor with Watson platform to help organizations more rapidly understand attacker behaviors. The IBM QRadar Advisor with Watson 2.0 release is an artificial intelligence (AI) platform that enables organizations to collect...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56135613

    NOKIA’S SOFTWARE BIZ IS FIRMLY ROOTED IN SILICON VALLEY

    Nov 28, 2018

    Nokia is making its presence in Silicon Valley a bit more prominent with the addition of a new corporate campus in Sunnvale, California. Although the campus won’t be ready until the first half of 2020, the company’s intent is to bring together its 1,000 or so employees that are currently...

    SDXCENTRAL
    READ MORE

    /news-article.aspx?ID=56185618

    MICROSOFT REVEALS MORE ON RECENT SECURITY HICCUPS

    Nov 27, 2018

    Remember that big outage that happened last week to Azure, Office 365 and Dynamic users? Well, Microsoft has shed some more light on what the underlying causes were. Publicly releasing root causes to the issue, Microsoft said there were three separate problems that led to the downtime. The first two...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=56035603

    SCAM WEBSITES ARE USING THAT GREEN HTTPS PADLOCK TO FOOL YOU

    Nov 27, 2018

    You may have heard you should look for the padlock symbol at the top of a website before entering your password or credit card information into an online form. It's well-meaning advice, but new data shows it isn't enough to keep your sensitive information secure. As it turns out, fraudsters ...

    CNET
    READ MORE

    /news-article.aspx?ID=56045604

    CRYPTOCURRENCY-STEALING CODE DISTRIBUTED VIA POPULAR LIBRARY

    Nov 27, 2018

    The popular EventStream Node.js library was recently modified to fetch malicious code designed to steal crypto-currencies. Designed as a toolkit to make creating and working with streams easy, the JavaScript package has around two million downloads a week, which makes it a valuable resource to appli...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=56055605

    AWS BOOSTS SERVERLESS SECURITY WITH FIRECRACKER MICROVMS

    Nov 27, 2018

    Amazon Web Services is looking to further accelerate the adoption of serverless computing with the announcement on Nov. 26 at its re:Invent conference of its new open-source Firecracker lightweight virtualization technology. There has long been a debate about whether or not it is necessary to run co...

    EWEEK
    READ MORE

    /news-article.aspx?ID=56065606

    WHAT IS WINDOWS HELLO? MICROSOFT’S BIOMETRICS SECURITY SYSTEM EXPLAINED

    Nov 26, 2018

    Windows Hello is a biometrics-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services and networks with just a fingerprint, iris scan or facial recognition. The sign-in mechanism is essentially an alternative to passwords and is widely con...

    ITNEWS
    READ MORE

    /news-article.aspx?ID=55955595

    ALIBABA RESTRUCTURES AMIDST CLOUD COMPUTING PUSH AND GROWTH

    Nov 26, 2018

    Alibaba Group Chief Executive Daniel Zhang announced that the company would be restructuring its cloud business unit and its Tmall e-commerce business. This comes just weeks after Zhang told CNBC that Alibaba Cloud would be the group’s main business in the future. Alibaba will rename its cloud...

    SDNCENTRAL
    READ MORE

    /news-article.aspx?ID=55965596

    RESEARCHERS USE SMART BULB FOR DATA EXFILTRATION

    Nov 26, 2018

    Researchers with software risk measurement and management company Checkmarx were able to create two mobile applications that abuse the functionality of smart bulbs for data exfiltration. For their experiment, the researchers used the Magic Blue smart bulbs, which work with both Android and iOS, and ...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=55975597

    DOS VULNERABILITIES IMPACT LINUX KERNEL

    Nov 26, 2018

    Two recently disclosed Linux kernel vulnerabilities that remain unpatched could be exploited for local denial-of-service (DoS). The flaws, both which were made public last week, impact Linux kernel 4.19.2 and previous versions. Both represent NULL pointer deference bugs that can be exploited by loca...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=55985598

    US SAYS CHINA INCREASED HACKING OVER TRADE DISPUTE

    Nov 23, 2018

    In advance of a meeting between US President Donald Trump and China's President Xi Jinping, a US government report made claims that China had increased hacking attempts in an effort to steal American technology and shows no sign of stopping or slowing its cyber-theft practices, according to the ...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=55865586

    MICROSOFT TAKES ANOTHER STEP TOWARDS KILLING PASSWORDS

    Nov 22, 2018

    People looking to log into their Microsoft accounts no longer need passwords to do so. The Redmond giant has announced today that it is supporting passwordless user authentication, which uses biometrics, the Microsoft Authenticator app, or a FIDO2-compatible device. A whole swathe of Microsoft servi...

    ITPROPORTAL
    READ MORE

    /news-article.aspx?ID=55885588

    USPS REPORTEDLY FIXES WEBSITE BUG THAT EXPOSED DATA OF 60M USERS

    Nov 22, 2018

    Just in time for the holiday shopping season, it appears the US Postal Service has fixed a security flaw that allowed all USPS.com account holders, some 60 million people, to see personal details of fellow users. Cybersecurity expert Brian Krebs wrote about the bug on Wednesday, noting that he was c...

    CNET
    READ MORE

    /news-article.aspx?ID=55935593

    SIGNIFICANT LACK IN AWARENESS OF IOT SECURITY AMONG IT LEADERS, STUDY FINDS

    Nov 21, 2018

    A survey conducted by IT security firm Trend Micro has revealed that 86% of IT and security decision makers around the world believe their organisations need to enhance their awareness of IoT threats. This is due to significant lack of knowledge which accompanies rising threat levels and security ch...

    IOT TECH NEWS
    READ MORE

    /news-article.aspx?ID=55805580

    FACEBOOK BOOSTS BUG BOUNTY PAYOUTS FOR ACCOUNT TAKEOVER FLAWS

    Nov 21, 2018

    Facebook has faced multiple challenges over the course of 2018 as it has struggled with inauthentic user behavior, abuse of private information and outright attacks where user accounts were hijacked. In an effort to improve user account security and mitigate hijacking threats, Facebook announced on ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=55815581

    ATTACKERS EXPLOIT RECENTLY PATCHED POPULAR WORDPRESS PLUGIN

    Nov 21, 2018

    Recently patched vulnerabilities in the popular AMP for WP plugin are being targeted in an active Cross-Site Scripting (XSS) campaign, Wordfence reports. With over 100,000 installs, the plugin adds Accelerated Mobile Pages (Google AMP Project) functionality to websites, which makes them faster for m...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=55825582

    HACKERS LINKED TO RUSSIA IMPERSONATE US OFFICIALS

    Nov 20, 2018

    In a targeted campaign directed at multiple organizations across law enforcement, media, pharmaceutical and other public sectors, hackers with alleged ties to the Russian government have been trying to infiltrate US government computers and networks, according to a new report published by FireEye. M...

    INFOSECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=55745574

    PORTSHIFT PLATFORM LOOKS TO SECURE APPLICATION IDENTITY IN THE CLOUD

    Nov 20, 2018

    Assigning identity to applications has long been a challenge for organizations, and it's one that startup Portshift is looking to help solve. Portshift officially launched on Nov. 20, backed by Israeli cyber-security accelerator Team8 and $5.3 million in seed funding. Portshift's core techno...

    EWEEK
    READ MORE

    /news-article.aspx?ID=55755575

    AWS LAUNCHES NEW SECURITY OFFERING WHICH MITIGATES S3 MISCONFIGURATIONS – IF CUSTOMERS GET IT RIGHT

    Nov 20, 2018

    Amazon Web Services (AWS) has announced extra steps to ensure customers’ S3 buckets don’t become misconfigured – but don’t assume responsibility has been taken away from the customer. The new service, Amazon S3 Block Public Access, can work at the account level, on individual...

    CLOUD COMPUTING
    READ MORE

    /news-article.aspx?ID=55765576

    TP-LINK PATCHES REMOTE CODE EXECUTION FLAWS IN SOHO ROUTER

    Nov 19, 2018

    Vulnerabilities recently addressed by WiFi device maker TP-Link in its TL-R600VPN small and home office (SOHO) router could allow remote code execution, Cisco Talos security researchers warn. The issues were mainly caused by lack of input sanitization and parsing errors. Lack of proper input sanitiz...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=55685568

    IS YOUR DATA BREACH RESPONSE PLAN READY?

    Nov 19, 2018

    Fifty-six percent of organizations experienced a data breach involving more than 1,000 records over the past two years, and of those, 37 percent occurred two to three times and 39 percent were global in scope, according to Experian. In 2017 in particular, there were more than 5,000 reported data bre...

    SECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=55695569

    SONICWALL LAUNCHES SD-WAN, RISK METRICS AND NEW UTM HARDWARE

    Nov 19, 2018

    SonicWall is adding multiple new features to its product portfolio, in a bid to help organizations further secure their on-premises and hybrid cloud assets against threats. Among the new features coming to SonicWall's Capture Cloud Platform are zero-touch deployment options and software-defined ...

    EWEEK
    READ MORE

    /news-article.aspx?ID=55705570

    TEXAS HOSPITAL BECOMES VICTIM OF DHARMA RANSOMWARE

    Nov 19, 2018

    The Altus Baytown Hospital (ABH) has revealed a ransomware outbreak which may have led to the leak of patient data. In a statement on its website, the Texas-based hospital said that ABH discovered an unauthorized threat actor rifling through the organization's systems on roughly September 3. The...

    ZDNET
    READ MORE

    /news-article.aspx?ID=55945594

    DRIDEX/LOCKY OPERATORS UNLEASH NEW MALWARE IN RECENT ATTACK

    Nov 16, 2018

    The threat actor(s) behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT), Proofpoint security researchers warn. Known as TA505, the attackers have been using malware dubbed tRat, which was written in Delphi and is modular in nature. The new piece of malware was fir...

    SECURITYWEEK
    READ MORE

    /news-article.aspx?ID=55575557