Saturday , 23 September 2017
Home » NEWS » EDITOR’S NEWS

EDITOR’S NEWS

Beyond the Phish Report from Wombat Security Reveals the No. 1 Problem Area for End-Users is Protecting Confidential Information

Wombat Security Technologies (Wombat), the leading provider of cyber security awareness and training, today announces the release of its 2017 Beyond the Phish Report. The analysis of more than 70 million questions and answers – a significant increase from 20 million in 2016 – across 10 categories identifies strengths and weaknesses tied both directly to phishing and threats beyond the ... Read More »

Businesses paid £222M to ransomware hackers last year, new Datto study finds

Datto, Inc. revealed the results of its second annual global State of the Channel Ransomware Report. As the largest survey of its kind, the report provides unique visibility into the current state of ransomware from more than 1,700 managed service providers (MSPs) who work with more than 100,000 small-to-mid-sized businesses (SMBs) around the world. Ninety-nine percent of MSPs predict uptick ... Read More »

Never too early: Synopsys’ BSIMM8 study champions benchmarking in the early stages of Software Security Initiatives

For Synopsys, the trend towards more companies taking software security is nothing but a good thing. Having long championed the importance of integrating security into software, their latest BSIMM (Building security in Maturity Model) report will be an encouragement that the industry is sitting up and paying attention. Synopsys designed the BSIMM model in 2008, as a comprehensive tool for ... Read More »

Next-Gen Cloud Sandboxing Improves Malware Detection and Remediation

WatchGuard’s new generation of cloud-based sandboxing technology is able to automatically analyse suspicious endpoint files to identify behaviour associated with persistent threats, zero day attacks and evasive malware, to deliver fast and confident endpoint threat remediation. The new service correlates network and endpoint security events – on or off the corporate network – with threat intelligence, to detect, prioritise and ... Read More »

Hackers “Strut” in Again… And Equifax (and 143 million customers) is probably just the first to fall victim

Here we go again: Yet another major breach exploiting a well-known vulnerability to which a patch was available long before the attack! Criminals who potentially gained access to the personal data of up to 143 million Equifax costumers, exploited an Apache Struts CVE-2017-5638 vulnerability. The stolen data may include Social Security numbers, birth dates, driver’s licenses, addresses and 209,000 credit ... Read More »

GLOBAL VODAFONE SURVEY SHOWS STRONG CYBER SECURITY HELPS BUSINESSES TO GROW

A new cyber security report from Vodafone, Cyber Security: The Innovation Accelerator, highlights a strong link between how cyber security is used and business success, with 86 per cent of high-growth companies1 seeing information security as an enabler of new business opportunities, rather than simply a means of defence. The research showed a number of perceived benefits that strong cyber ... Read More »

First Half 2017 Breach Level Index Report: Identity Theft and Poor Internal Security Practices Take a Toll

Gemalto, the world leader in digital security, today released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last six months of 2016, the number of lost, stolen or compromised records increased by ... Read More »

Vulnerabilities in mobile networks opens bitcoin wallets to hackers

Vulnerabilities in mobile networks opens bitcoin wallets to hackers Positive Technologies shows how hackers can gain access to bitcoin wallets using architecture flaws in SS7 Cryptocurrencies offer unprecedented transaction speeds and remittance security, but this is compromised by the weak security of digital wallets storing them. Positive Technologies has demonstrated an attack on a user account of Coinbase — one ... Read More »

An (un)documented Feature: Attackers Abuse Office Document Software to Profile Potential Victims for Targeted Attacks

Kaspersky Lab experts have discovered a feature in popular document-creation software that has been abused by attackers to launch successful targeted attacks. Using a malicious application that activates when the simple office document is opened, information about the software installed on the victim’s device is sent automatically to the attackers, with no user interaction required. This data allows attackers to ... Read More »

UK education system exacerbating cyber skills gap as almost three quarters of British adults let down on digital skills at school

The latest research from McAfee reveals that British school education has played a major role in today’s cyber skills gap – leaving adults without sufficient IT skills and little to no insight into careers in cyber security.   Classroom inspiration In a survey of 2,000 UK-based respondents, McAfee found a clear link between school IT lessons and interest in cyber ... Read More »