Monday , 27 March 2017
Home » Author Archives: Japonica Jackson

Author Archives: Japonica Jackson

Japonica is head of editorial at IT Security Guru. If you'd like to get in touch with Japonica, please email editor@itsecurityguru.org.

Forcepoint survey reveals European CISOs face major challenge protecting employees against data breaches and insider threats

Global cybersecurity leader Forcepoint™ today unveiled research showing that 35% of employees across the UK, France, Germany and Italy admit to have been involved in a security breach, presenting regional CISOs with a significant challenge when it comes to protecting company data, particularly in light of the forthcoming European General Data Protection Regulation will come into effect in early 2018. ... Read More »

GiftGhostBot scares up victims’ gift-card cash with brute-force attacks

Cybercrooks are using a bot to automate the process of breaking into and draining online gift card accounts. The software nasty, named GiftGhostBot, attempts to steal cash from money-loaded gift cards provided by a variety of retailers around the globe, according to Distil Networks. Any website – from luxury retailers to supermarkets to major coffee distributors – with gift card ... Read More »

New GDPR training course endorsed by the Cloud Industry Forum

The Cloud Industry Forum (CIF), the industry body whose aim is to raise standards and improve transparency in the cloud sector, has partnered with Assuredata, a GDPR Practitioner, and Federation Against Software Theft (FAST), to launch a new training scheme to raise awareness to the cloud industry of the requirements to comply with GDPR. Every UK firm has until 25 ... Read More »

The profit margins benefiting criminals from illegal DDoS services

Kaspersky Lab’s experts have studied the DDoS services available on the black market and determined just how far this illegal business has advanced, as well as the extent of its popularity and profitability. The worrying news is that arranging an attack costs as little as $7 an hour, while the targeted company can end up losing thousands, if not millions, ... Read More »

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

If the CIA wants inside your Mac, it may not be enough that you so carefully avoided those infected email attachments or maliciously crafted web sites designed to plant spyware on your machine. Based on new documents in WikiLeaks’ ongoing release of CIA hacking secrets, if Langley’s hackers got physical access, they still could have infected the deepest, most hidden recesses ... Read More »

Kaspersky warns lights could go out

The connected world in which we live could suffer a catastrophic blackout unless critical infrastructure is secured, warns Eugene Kaspersky founder and CEO, Kaspersky Lab. The ramifications of a blackout, like the one recently experienced in Ukraine, are deep reaching. During a blackout none of the devices connected to the lauded Internet of Things would be able to ‘talk’ to ... Read More »

When is a phishing email not a phishing email? The taxonomy of malicious emails

Markus Jakobsson, Chief Scientist,
Agari

Malicious email attacks have dominated the security headlines in recent months, with 2017 already seeing large campaigns targeting Netflix and Amazon customers. Despite the number of incident however, many individuals and businesses alike don’t actually know what kind of attacks they are being hit by. In order for a business to defend against malicious email attacks it is essential that ... Read More »

Millions of SAP Users Exposed to Ransomware due to GUI Vulnerability

A serious vulnerability in the SAP client GUI could expose millions of end-users of the popular enterprise resource planning (ERP) software to ransomware attacks – and worse. That is the warning of Vahagn Vardanyan, a senior security researcher at ERP software security specialists ERPScan, demonstrating the flaw for the first time today at the company’s Troopers security conference in Heidelberg, ... Read More »

Google’s ‘Protect Your Election’ – Exporting Cloud Security To Government

From its closed supply chains, custom-designed security chips and 700-strong security engineering team to instant two-factor authentication and IAP and DLP offerings, Google has been moving aggressively both to tout its own security credentials and to “Googlefy” the enterprise – dragging it kicking and screaming out of half-century-old security practices and to a modern security stance. Through its sister organization ... Read More »

Majority of UK Biz Lacks DNS Insight, Leading to DDoS and More

Most UK businesses are in the dark when it comes to the impact that domain name system (DNS) performance is having on their internet users and visitors. At its most basic, DNS is an address book which matches websites to IP addresses—and it’s a key part of how the internet functions. Yet according to a Neustar-commissioned survey carried out by ... Read More »