Thursday , 21 June 2018
Home » NEWS (page 20)


Users Warned of Critical PGP Email Encryption Security Flaw

A team of nine academics is warning the world about critical vulnerabilities in the and encryption tools. The flaws, if exploited, allow an attacker to decrypt sent or received messages, according to the researcher team. View Full Story ORIGINAL SOURCE: Bleeping Computer Read More »

Five on-the-Ground Insights on Implementing Endpoint Security in the Cloud

Rick McElroy, Security Strategist,
Carbon Black

Today’s “access-everything-anywhere-anytime” mobile data environment is great news for business productivity and performance but on the flipside it’s also a huge opportunity for cybercriminals. The increasing multitude of endpoints represents an ever-expanding playground in which to develop new ways of infiltrating corporate networks and making off with the digital goods. Malware, ransomware and a rising incidence of fileless attacks all ... Read More »

Compliance comes back into focus

Javid Khan, CTO,
LayerV, a Pulsant company

By Javid Khan, CTO of LayerV, a Pulsant company Compliance is something organisations have been grappling with for some time. However, it has come into focus once again with the impending EU General Data Protection Regulation (GDPR). Time is running out. From May 25th, any business that falls foul of a data breach could face a potential fine of €20m, ... Read More »

Is the C-suite exempt from cyber-crime anxiety?

Greg Sim, CEO,

If recent cyber-attacks are anything to go by, cyber-criminals are capable of causing colossal damage to organisations of all sizes. With vital public services such as the NHS succumbing to attacks, it seems that nothing is off the table when it comes down to cyber-criminals deciding who to target. However, according to some reports, the C-suite isn’t sweating over the ... Read More »

86% of the UK’s most valuable brands fail to safeguard consumers online

Red Sift, a data-driven cybersecurity platform, has published new research into the UK’s top 50 most valuable brands’ email domains, revealing that 86% of these brands do not have the appropriate measures in place to fully protect their customers from email fraud with the GDPR deadline looming. The snapshot study focused specifically on determining whether or not these industry giants were ... Read More »

Botnet Operators Cash in on Rewards Programme Credentials

Kat Weinberger, Intelligence Analyst,

By Kat Weinberger, Intelligence Analyst, Flashpoint Flashpoint analysts have been tracking several small specialty shops in the Russian-language underground advertising access to the login credentials of customer accounts for travel and hospitality rewards programmes. Since the observed vendors appear to offer a small number of accounts from a large number of institutions, Flashpoint analysts believe the accounts were obtained incidentally ... Read More »

Can consumers bank on financial services being secure with GDPR?

Ralf Sydekum, Technical Manager,
F5 Networks

By Ralf Sydekum, Technical Manager, F5 Networks The face of finance is changing. Many institutions are abandoning the high street and moving towards a faster, more responsive 24-hour on-line services to meet customer demand. Yet, as digital engagement increases, hacker groups are using sophisticated tools to infiltrate operations and attack critical applications to gain access to data. According to the ... Read More »

Global Study by Netwrix Finds Rapid Cloud Adoption by Government Lacks Security

Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today released the 2018 Netwrix Cloud Security: In-Depth Report for Government infographics. The infographics provide insight into the use of cloud technology by government departments and highlight their concerns and plans regarding data security in the cloud. The report reveals that the rapid pace ... Read More »

Researchers Come Up With a Way to Launch Rowhammer Attacks via Network Packets

Five academics from the Vrije University in Amsterdam and one from the University of Cyprus have discovered a way for launching Rowhammer attacks via network packets and network cards. Their discovery makes Rowhammer attacks easier and much more convenient to launch, as an attacker only needs to bombard a victim’s network card with specially-crafted packets. View full story ORIGINAL SOURCE: ... Read More »

Firefox 60’s WebAuthn API: No Password Required

In the web browser war, Mozilla is positioning itself to dominate over the competition with its release of Firefox 60, which includes the option of a password-less signin. The latest version of the Firefox browser uses a Web Authentication API, WebAuthn for short, which enables authentication using public key cryptography, taking credentials management to a new level. View full story ORIGINAL ... Read More »