Sunday , 24 September 2017
Home » Author Archives: Dean Alvarez (page 30)

Author Archives: Dean Alvarez

Dean is Features Editor at IT Security Guru. Aside from cyber security and all things tech, Dean's interests include wine tasting, roller blading and playing the oboe in his Christian rock band, Noughts & Crosses.

You can reach Dean via email -

How do SMEs fight off cyber-attacks?

Mike Viscuso, CTO,
Carbon Black

In this article I want to address some of the concerns that small and medium sized enterprises may have around cybersecurity, especially in the wake of the WannaCry ransomware attack and a continuous news flow around successful attacks on high profile companies. Does the fact that well-known brands are successfully attacked and breached mean that SMEs are even more at ... Read More »

IBM Mainframe Ushers in New Era of Data Protection

IBM today unveiled IBM Z, the next generation of the world’s most powerful transaction system, capable of running more than 12 billion encrypted transactions per day. The new system also introduces a breakthrough encryption engine that, for the first time, makes it possible to pervasively encrypt data associated with any application, cloud service or database all the time. IBM Z’s ... Read More »

Third of the UK Public not aware of the security policies implemented by their company

Recent survey reveals that almost 1 in 3 UK employees are not aware of their company’s safety and security policies. ​​News of global ransomware attacks shows future advanced technology poses a major threat with devastating consequences. Danny Schofield, Managing Director at Expert Security UK has gathered expert opinions to help business owners introduce and maintain a robust security culture in ... Read More »

Security Serious Interview with Quentyn Taylor: Security Leader Winner 2016

I got on the phone with Quentyn Taylor, Director of Information Security EMEA for Canon Europe and we had a friendly chat about his participation in last year’s Security Serious Unsung Heroes Awards where he won the Security Leader Award. As always, Quentyn is extra polite and he encourages our team to “keep up the good work”. Quentyn has a wealth ... Read More »

Regulator and CSO in stand-off over mobile data

An extraordinary stand-off has emerged between the State’s official statistics body and the data protection watchdog over a plan by the Central Statistics Office (CSO) to force mobile phone network providers to hand over roaming data about tourists and Irish residents travelling abroad. View Full Story ORIGINAL SOURCE: Irish Times Read More »

Did you receive a WhatsApp subscription ending email or text? Watch out! It is a scam to steal your payment and personal data

Researcher Graham Cluley is warning of bogus ‘WhatsApp subscription ending’ emails and texts. View Full Story ORIGINAL SOURCE: Security Affairs Read More »

One in four workers have hidden cyber security incidents from employers

One in four workers have hidden cyber security incidents from their employers in order to avoid punishment, according to a new report exploring the human side of security. View Full Story ORIGINAL SOURCE: Dof Online Read More »

Study finds gaps in security analysts’ malware knowledge

Malware detection firm Lastline has today announced the results of a survey conducted with 326 cyber security professionals that tested their knowledge of malware and current cyber threats. Respondents were asked to identify different malware behaviours. The overwhelming majority were aware that malware can turn a webcam on to see if anyone is sitting in front of the computer (98 ... Read More »

Wikileaks Vault 7: Latest Documents Show Android Malware From CIA

Wikileaks published another set of documents Thursday. The latest release of files purportedly from the U.S. Central Intelligence Agency (CIA) details a piece of malicious software for Android devices. The malware, referred to as Highrise, can redirect or intercept text messages sent to a target’s phone, allowing a CIA agent to access it before it lands in the inbox of ... Read More »

Petya malware behavior may change based on AV installed

Researchers found changes in malware behavior when Petya detected certain security products, but experts are unsure why these features might exist. View Full Story ORIGINAL SOURCE: Search Security Read More »