Monday , 16 July 2018
Home » Author Archives: Japonica Jackson

Author Archives: Japonica Jackson

Japonica is head of editorial at IT Security Guru. If you'd like to get in touch with Japonica, please email editor@itsecurityguru.org.

Nozomi Networks teams up with IBM to Answer Demand for Integrated IT/OT Cyber Security

With Operational Technology (OT) attacks on the rise, Nozomi Networks and IBM earlier this week announced that they have teamed up to bring industrial organizations around the world easier access to deep OT network visibility and continuous threat detection. The news follows recent warning from various bodies – including the UK’s NCSC and the US’ DHS and FBI of an ... Read More »

Kapersky Report: $10 Million in Ether Stolen Through Phishing Last Year

A new report from Kapersky Labs claims that cybercriminals are turning to cryptocurrency as a domain for scams and frauds. The schemes target ICO investors, who are perhaps vulnerable as they are seeking to invest money to begin with. “Kaspersky Lab experts have exposed a relatively new fraudulent trend: the development of cryptocurrency is not only attracting investors, but also cyber-criminals seeking ... Read More »

Crypto-mining Malware Doubles from Last Year

The number of global organizations affected by crypto-mining malware more than doubled from the second half of 2017 to the first six months of this year, according to new data from Check Point. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Read More »

WordPress Sites Targeted in World Cup-Themed Spam Scam

Spammers using a ‘spray & pray’ approach to post comments on WordPress powered blogs, forums, says Imperva. WordPress-powered websites are being targeted in a comment spam campaign designed to get users to click on links to sites offering betting services on the 2018 FIFA World Cup games. View Full Story ORIGINAL SOURCE: Dark Reading Read More »

‘Data is a fingerprint’: why you aren’t as anonymous as you think online

In August 2016, the Australian government released an “anonymised” data set comprising the medical billing records, including every prescription and surgery, of 2.9 million people. View Full Story ORIGINAL SOURCE: The Guardian Read More »

Cylance Unveils “Cylance Smart Antivirus;” AI-Powered Antivirus for Consumers

Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today launched Cylance Smart Antivirus, AI-powered antivirus software designed specifically for consumers. By extending the enterprise-grade AI of CylancePROTECT into the home, Cylance provides internet users with next-generation security software that proactively predicts and blocks never-before-seen threats. More than 350,000 new pieces of malware are created every day, and traditional consumer antivirus software simply can’t ... Read More »

Popular Software Site Hacked to Redirect Users to Keylogger, Infostealer, More

Hackers have breached the website of VSDC, a popular company that provides free audio and video conversion and editing software. Three different incidents have been recorded during which hackers changed the download links on the VSDC website with links that initiated downloads from servers operated by the attackers. View Full Story ORIGINAL SOURCE: Bleeping Computer Read More »

Newly Found Spectre Variants Bring New Concerns

The plague that is Spectre continues to evolve and adapt, showing up in two new variants this week dubbed Spectre 1.1 and Spectre 1.2 that follow the original Spectre’s playbook while expanding on the ways they can do damage. View Full Story ORIGINAL SOURCE: Dark Reading Read More »

Ticketmaster Breach Part of Global Digital Skimming Campaign

The Ticketmaster UK ‘breach’ is far more extensive than at first thought — part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Read More »

Privileged access management is the next great step for businesses to take in cybersecurity, says EACS

Insider threats represent a significant danger to organisations trying to guard sensitive data from breaches, especially as businesses are tasked with protecting ever-growing amounts of data in the GDPR era. To tackle this, managed services provider EACS believes that privileged access management (PAM) needs to become a fixture of any cybersecurity strategy, and has demonstrated this commitment by entering into a collaborative ... Read More »