Sunday , 24 September 2017
Home » Tag Archives: Cyber (page 2)

Tag Archives: Cyber

UK councils a top target for cyber attacks

Local government is a high target for cyber criminals after a study revealed that most UK local authorities have suffered cyber attacks in the past year. View Full Story ORIGINAL SOURCE: Computer Weekly Read More »

Researchers use infrared and malware to control CCTV cameras

Security researchers were able to use infrared (IR) light to control the behavior of security cameras infected with malware, which can work with both professional and home security cameras. The technique was detailed in a research paper published on Monday. The technique is called “aIR-Jumper,” and it will work with both professional and home security cameras, according to press release from Ben-Gurion University ... Read More »

WhatsApp denies British Gov ‘backdoor’ access into encrypted messages

The instant messaging app WhatsApp has reportedly rejected a demand from the British government to create a backdoor into its secure network which would allow UK security services to access messages sent through the service. The reason for encrypted messages is to protect communications between users. View Full Story ORIGINAL SOURCE: IB Times UK Read More »

Iranian hacking group APT33 creators of destructive malware

Advanced Persistent Threat 33, an Iranian hacking group, has been linked to a series of breaches of companies in the aerospace, defense, and petrochemical industries in countries as wide-ranging as Saudi Arabia, South Korea, and the US. View Full Story ORIGINAL SOURCE: Wired Read More »

Utilising Threat Hunting techniques to detect and defend against malware attacks

Justin Swisher, Threat Analyst at Anomali and Kris Merritt, Co-Founder at Vector 8

Since the outbreak of Petya, there have been many articles analysing and dissecting the malware, to determine its purpose, and who is ultimately responsible. Reverse engineering and malware analysis to conduct post incident analysis has provided the basis for the conclusions drawn in these features. Instead, Anomali, in collaboration with threat hunting experts Vector8, viewed the Petya outbreak differently by ... Read More »

Next-Gen Cloud Sandboxing Improves Malware Detection and Remediation

WatchGuard’s new generation of cloud-based sandboxing technology is able to automatically analyse suspicious endpoint files to identify behaviour associated with persistent threats, zero day attacks and evasive malware, to deliver fast and confident endpoint threat remediation. The new service correlates network and endpoint security events – on or off the corporate network – with threat intelligence, to detect, prioritise and ... Read More »

Hackers “Strut” in Again… And Equifax (and 143 million customers) is probably just the first to fall victim

Here we go again: Yet another major breach exploiting a well-known vulnerability to which a patch was available long before the attack! Criminals who potentially gained access to the personal data of up to 143 million Equifax costumers, exploited an Apache Struts CVE-2017-5638 vulnerability. The stolen data may include Social Security numbers, birth dates, driver’s licenses, addresses and 209,000 credit ... Read More »

GLOBAL VODAFONE SURVEY SHOWS STRONG CYBER SECURITY HELPS BUSINESSES TO GROW

A new cyber security report from Vodafone, Cyber Security: The Innovation Accelerator, highlights a strong link between how cyber security is used and business success, with 86 per cent of high-growth companies1 seeing information security as an enabler of new business opportunities, rather than simply a means of defence. The research showed a number of perceived benefits that strong cyber ... Read More »

First Half 2017 Breach Level Index Report: Identity Theft and Poor Internal Security Practices Take a Toll

Gemalto, the world leader in digital security, today released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last six months of 2016, the number of lost, stolen or compromised records increased by ... Read More »

Shoplifting: Defeating Theft Detection and Prevention Technology

Rob Cook, Analyst,
Flashpoint

Typically considered one of the most accessible and in many cases least-sophisticated types of crime, shoplifting persists as an undeniably damaging affliction across the retail sector. In fact, the National Retail Security Survey reported that loss of inventory cost U.S. retailers an estimated $49 billion USD in 2016, with 70 percent of the loss caused by employee theft and shoplifting. The survey ... Read More »