Saturday , 26 May 2018
Home » Author Archives: Dean Alvarez (page 30)

Author Archives: Dean Alvarez

Dean is Features Editor at IT Security Guru. Aside from cyber security and all things tech, Dean's interests include wine tasting, roller blading and playing the oboe in his Christian rock band, Noughts & Crosses.

You can reach Dean via email - dean@itsecurityguru.org

Data Protection Bill Amended to Protect Security Researchers

The Government is to amend the data protection bill, in order to protect researchers who work to uncover cyber criminals, after fears were raised that the bill would accidentally criminalize legitimate research. View Full Story  ORIGINAL SOURCE: The Guardian Read More »

Cryptocurrency Mining Malware has links to N.Korea

A new malware too which installs software that mines virtual currency has links to North Korea, according to Security company AlienVault. View Full Story  ORIGINAL SOURCE: Dark Reading Read More »

Seven Ransomware Predictions for 2018

It might surprise you to know that most ransomware victims choose to pay a ransom to have their data restored. As long as victims continue to pay up, ransomware will continue to be a go-to strategy for cybercriminals. Furthermore, Forrester Research predicts that cybercriminals will increasingly use ransomware in 2018 to monetise attacks, as end-to-end encryption in payment systems often ... Read More »

Hackers adopt ‘school of fish’ approach as they sharpen focus on mid-sized businesses

Rudimentary attacks, like information gathering, reputation blocks, fraud, and brute force attacks, increased by 71% from 2016-2017, according to new data released by eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider. The data represents a total volume rise in detected events from 15 million in 2016, to 21 million last year. Reports demonstrate a marked technique shift ... Read More »

Fujitsu’s Top Five Predictions For Security In 2018

Paul McEvatt, Senior Cyber Threat Intelligence Manager, UK & Ireland and Bryan Campbell Senior Security Researcher & Fujitsu Distinguished Engineer,
Fujitsu UK & Ireland

Using CTI to support a back to basics approach   Cyber Threat Intelligence (CTI) can be defined in many different ways and it can simply be a threat feed. In the coming year, it will be important to use threat intelligence to provide an early warning system to customers and context to threats. In short, by doing the hard work, ... Read More »

McAfee acquires the worldwide leader in the CASB market segment

McAfee today announced the completion of its previously announced acquisition of Skyhigh Networks. With the close of this deal, Skyhigh Networks becomes part of the McAfee Cloud Security Business Unit.   Skyhigh is an ideal complement to McAfee’s strategy – one focused on building and optimising mission-critical cybersecurity environments for the future. Skyhigh Networks pioneered the cloud access security broker ... Read More »

Half of UK Businesses Are Fearful Robotic Process Automation

A recent OnePoll survey1 for Ultima has found more than half (57 per cent) of the UK’s SMEs fear big businesses use of robotic process automation will help to drive them out of business in the next five years, yet 10 per cent believe that automating repetitive, time-consuming tasks is not important to their success.   However, the survey found ... Read More »

Phishing attacks on Cloud-based systems the new thing for criminal activity

Cyber criminals have discovered a way of using Google App Scripts that will trigger the download of malware hosted on the Google drive of any computer. View Full Story ORIGINAL SOURCE: SC Magazine UK Read More »

Apple devices also impacted by Intel vulnerabilities

Apple has warned its customers that the Meltdown and Spectre vulnerabilities will affect Mac systems and iOS devices. View Full Story ORIGINAL SOURCE: ZDNet Read More »

See if a hacker has taken control of your child’s smart toy

The issue of toys being a choking hazard is still a concern for parents however, a hacker taking control of their child’s smart toy and exposing the rest of the family should definitely be high on the list. View Full Story ORIGINAL SOURCE: IBTimes Read More »