Friday , 20 July 2018
Home » Tag Archives: Cyber (page 20)

Tag Archives: Cyber

Authentication is imperfect, but passwords are not going away

Jonathan Bennun, Product Strategy,
OneLogin

As a hacker, I found vulnerabilities like easy-to-guess passwords made my work much easier. If that attack vector didn’t pan out, I could usually get around the authentication flow, or gain basic privileges and escalate them for admin access. We must accept that these vulnerabilities – imperfect authentication and passwords – are not going away anytime soon, and businesses must ... Read More »

The Software Economy’s unquenchable thirst for data

Iain Chidgey, VP and General Manager International,
Delphix

We live in a world where software is everywhere. It underlies almost every aspect of our personal and professional lives. Cloud connectivity, omnipresent networks and connected devices have transformed how we do mundane tasks. What used to take weeks and days, now takes minutes and seconds. As the pace of change has accelerated, it’s placed businesses under immense pressure. The ... Read More »

How to Pursue a Career in Ethical Hacking

Danish Wadhwa

Ethical hacking is a new way of looking at hacking which is used to finding weak spots in the program or system for the purpose of testing and fixing those weak points. It is normally performed by skilled developers or by a system knowledgeable person. Few people think that ethical hacking is illegal. Over the past few years, with the ... Read More »

UNICEF setup new initiative with cryptocurrency helping children in Bangladesh

UNICEF Australia wants you to fund its charitable missions using your computer’s processing power. The UN program that provides humanitarian and developmental assistance to children and mothers in developing nations has now launched The Hope Page, which allows the users to donate to its cause by mining cryptocurrency. View Full Story ORIGINAL SOURCE: The Next Web Read More »

City of London Police taking proactive step to counter cyber threat

The City of London Police is launching a drive to make the Square Mile more resilient to cyber attacks, as the financial services sector sharpens its focus on defending against online criminals. View Full Story  ORIGINAL SOURCE: FN London Read More »

Certain German Car Manufacturers Vulnerable to Remote Hacking

A Dutch cyber-security firm has discovered that in-vehicle infotainment (IVI) systems deployed with some car models from the Volkswagen Group are vulnerable to remote hacking. Daan Keuper and Thijs Alkemade, security researchers with Computest, said they successfully tested their findings and exploit chains on Volkswagen Golf GTE and Audi A3 Sportback e-tron models (Audi is a brand part of the ... Read More »

From underdog to influencer: the dramatic transformation of the IT team

Rajesh Ganesan, Director,
ManageEngine

IT has emerged as a business enabler in the UK; recent research from ManageEngine reveals that UK companies are excelling at aligning their overall business with IT. While business professionals working outside of the IT department are reportedly exhibiting strong IT knowledge, IT managers are also showing a greater understanding of their business as a whole. The survey results gathered ... Read More »

Cybersecurity strategies neglected in wake of the boardroom’s quest for digital

A new report by Cognizant’s Center for the Future of Work, Securing the Digital Future, reveals that, in the pursuit of digital transformation, organisations have overlooked one critical factor that could put all their transformation efforts – and even share prices- into jeopardy: cybersecurity. The research, which surveyed over 1,000 senior IT executives in 18 countries, found that only 9% ... Read More »

The cyber intelligence landscape is evolving

Kristofer Mansson, CEO,
Silobreaker

Written by Kristofer Mansson, CEO, Silobreaker Driven by digital innovation, business operations have undergone a fundamental transformation over the past decade. And as businesses have moved forward, the fundamentals of cybersecurity have followed behind: What are the weak points in my security strategy? Who are the main threats to my operations? Where am I at risk of compromise? As the ... Read More »

What does a DDoS attack sound like?

Ever wondered what a DDoS attack sounds like? Well now is your chance to find out. In a new blog post, researchers from Imperva showcase of a recent project around the sonification of DDoS attacks. In the project, Imperva researchers turned web traffic into sound and transmitted the whole thing over internet radio, which to their surprise turned out to ... Read More »