Saturday , 17 February 2018
Home » Author Archives: Dean Alvarez (page 60)

Author Archives: Dean Alvarez

Dean is Features Editor at IT Security Guru. Aside from cyber security and all things tech, Dean's interests include wine tasting, roller blading and playing the oboe in his Christian rock band, Noughts & Crosses.

You can reach Dean via email -

Ransomware on the rise: how to prevent an attack

Karl Simpson, CSO,

If the last few months have taught us anything, it’s that enterprises clearly need to take a long hard look at the cyber security they have in place.  One thing is clear – cyber threats now present a bigger risk to organisations than ever before.  Considering the huge growth in the number of new ransomware families (an increase of 752% ... Read More »

Synopsys Fuzzing Report Identifies IoT and Industrial Control Systems Software as Most Vulnerable to Exploits

In the latest fuzzing report by Synopsys, Inc. it was found the overall average time to first failure (TTFF) — the first instance when a protocol crash is recorded — was 1.4 hours. In the case of more mature protocols, the length of time is in hours. But with less mature protocols, that time could be as short as a ... Read More »

IoT connected soldiers hacked in latest Cyber Security Challenge UK competition

Last Friday evening, Government communications agency HMGCC, the MoD, BAE Systems and Cyber Security Challenge UK arranged a mock cyber-attack on Internet of Things (IoT) connected soldiers in the field at the MoD’s Defence Cyber School, part of the Defence Academy, Shrivenham. Twenty-four cyber amateurs battled against a fictitious hacktivist group to avert an attack on a live test run ... Read More »

Everton FC tackles data security in the cloud with Netskope Active Platform

Netskope, the leader in cloud security, today announced a deal with Everton FC to implement software which protects the Premier League club’s confidential data in the cloud.   The Netskope Active Platform analyses all cloud services – sanctioned and unsanctioned – for all employees (whether on premises or remote) to provide complete visibility into what data is being stored and ... Read More »

Lastline’s Market Momentum Dramatically Accelerates During Q2 2017

Lastline has announced explosive growth and market momentum throughout the first half of the year. In Q2 alone, the company saw its highest ever quarterly sales performance, signed partnerships with IBM and Forcepoint, completed a $28.5M Series C round of fundraising, and announced Lastline Breach Defender™, which provides unparalleled insight into network breaches. The company’s 50 percent year-over-year employee headcount growth ... Read More »

One Identity Safeguard Introduces Frictionless Security for Privileged Accounts to Aid in Organizations’ Digital Transformation

One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today announced a new version of its One Identity Safeguard privileged access management solution. The new solution, called One Identity Safeguard 2.0, includes new features that enable user flexibility and add redundancy while aiding the security of today’s hybrid infrastructures, including both on-premise and cloud-based ... Read More »

Skills gap could delay IoT innovation in the energy sector, finds Inmarsat

  If energy companies are to successfully deploy Internet of Things (IoT) technology to drive innovation, efficiency, and increased productivity, they must upskill current employees and/or embark on recruitment drives. This is according to independent research commissioned by Inmarsat (LSE:ISAT.L), which found that while the vast majority of energy companies have their sights set on IoT, a significant proportion lack ... Read More »

Attacking critical infrastructure – the evolution of kinetic warfare

Eric O’ Neill,,
National Security Strategist, Carbon Black

I said earlier in 2017 I believed it was quite possible that in 2017 a major cyberattack will occur in either the United States, the United Kingdom, or another friendly country that will require a response equivalent to a kinetic attack. In other words, a cyberattack will occur that will be looked on as an act of war. To date, ... Read More »

Phishing tops list of most prevalent security threats facing organisations globally

Results of SANS Institute 2017 Threat Landscape survey paints users and endpoints as primary targets, and part of the solution Security professionals rated phishing (72%), spyware (50%) and ransomware (49%) as top threats  37% of security professionals indicated that calls to the help desk enabled them to discover their most impactful threats   According to results of a new survey ... Read More »

Android app stores flooded with 1,000 spyware apps

Hackers have flooded Android app stores, including the official Google Play store, with over 1,000 spyware apps, which have the capability to monitor almost every action on an infected device. Dubbed SonicSpy, the malware can silently record calls and audio, take photos, make calls, send text messages to numbers specified by the attackers, and monitor calls logs, contacts, and information ... Read More »