Sunday , 24 September 2017
Home » Author Archives: Dean Alvarez (page 2)

Author Archives: Dean Alvarez

Dean is Features Editor at IT Security Guru. Aside from cyber security and all things tech, Dean's interests include wine tasting, roller blading and playing the oboe in his Christian rock band, Noughts & Crosses.

You can reach Dean via email - dean@itsecurityguru.org

Utilising Threat Hunting techniques to detect and defend against malware attacks

Justin Swisher, Threat Analyst at Anomali and Kris Merritt, Co-Founder at Vector 8

Since the outbreak of Petya, there have been many articles analysing and dissecting the malware, to determine its purpose, and who is ultimately responsible. Reverse engineering and malware analysis to conduct post incident analysis has provided the basis for the conclusions drawn in these features. Instead, Anomali, in collaboration with threat hunting experts Vector8, viewed the Petya outbreak differently by ... Read More »

Next-Gen Cloud Sandboxing Improves Malware Detection and Remediation

WatchGuard’s new generation of cloud-based sandboxing technology is able to automatically analyse suspicious endpoint files to identify behaviour associated with persistent threats, zero day attacks and evasive malware, to deliver fast and confident endpoint threat remediation. The new service correlates network and endpoint security events – on or off the corporate network – with threat intelligence, to detect, prioritise and ... Read More »

Hackers “Strut” in Again… And Equifax (and 143 million customers) is probably just the first to fall victim

Here we go again: Yet another major breach exploiting a well-known vulnerability to which a patch was available long before the attack! Criminals who potentially gained access to the personal data of up to 143 million Equifax costumers, exploited an Apache Struts CVE-2017-5638 vulnerability. The stolen data may include Social Security numbers, birth dates, driver’s licenses, addresses and 209,000 credit ... Read More »

GLOBAL VODAFONE SURVEY SHOWS STRONG CYBER SECURITY HELPS BUSINESSES TO GROW

A new cyber security report from Vodafone, Cyber Security: The Innovation Accelerator, highlights a strong link between how cyber security is used and business success, with 86 per cent of high-growth companies1 seeing information security as an enabler of new business opportunities, rather than simply a means of defence. The research showed a number of perceived benefits that strong cyber ... Read More »

First Half 2017 Breach Level Index Report: Identity Theft and Poor Internal Security Practices Take a Toll

Gemalto, the world leader in digital security, today released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last six months of 2016, the number of lost, stolen or compromised records increased by ... Read More »

Shoplifting: Defeating Theft Detection and Prevention Technology

Rob Cook, Analyst,
Flashpoint

Typically considered one of the most accessible and in many cases least-sophisticated types of crime, shoplifting persists as an undeniably damaging affliction across the retail sector. In fact, the National Retail Security Survey reported that loss of inventory cost U.S. retailers an estimated $49 billion USD in 2016, with 70 percent of the loss caused by employee theft and shoplifting. The survey ... Read More »

Apple Issues Security Updates for 6 products

The following products have had security updates published by Apple: Xcode 9, tvOS 11, watchOS 4, Safari 11, iOS 11, and iTunes 12.7 (for both macOS and Windows). View Full Story ORIGINAL SOURCE: https: BleepinComputer Read More »

Vulnerabilities in mobile networks opens bitcoin wallets to hackers

Vulnerabilities in mobile networks opens bitcoin wallets to hackers Positive Technologies shows how hackers can gain access to bitcoin wallets using architecture flaws in SS7 Cryptocurrencies offer unprecedented transaction speeds and remittance security, but this is compromised by the weak security of digital wallets storing them. Positive Technologies has demonstrated an attack on a user account of Coinbase — one ... Read More »

An (un)documented Feature: Attackers Abuse Office Document Software to Profile Potential Victims for Targeted Attacks

Kaspersky Lab experts have discovered a feature in popular document-creation software that has been abused by attackers to launch successful targeted attacks. Using a malicious application that activates when the simple office document is opened, information about the software installed on the victim’s device is sent automatically to the attackers, with no user interaction required. This data allows attackers to ... Read More »

UK education system exacerbating cyber skills gap as almost three quarters of British adults let down on digital skills at school

The latest research from McAfee reveals that British school education has played a major role in today’s cyber skills gap – leaving adults without sufficient IT skills and little to no insight into careers in cyber security.   Classroom inspiration In a survey of 2,000 UK-based respondents, McAfee found a clear link between school IT lessons and interest in cyber ... Read More »