Monday , 27 March 2017
Home » Tag Archives: security

Tag Archives: security

Forcepoint survey reveals European CISOs face major challenge protecting employees against data breaches and insider threats

Global cybersecurity leader Forcepoint™ today unveiled research showing that 35% of employees across the UK, France, Germany and Italy admit to have been involved in a security breach, presenting regional CISOs with a significant challenge when it comes to protecting company data, particularly in light of the forthcoming European General Data Protection Regulation will come into effect in early 2018. ... Read More »

Switzerland to Build AI Cognitive Security Ops Centre to Protect Banks

Famous for its cuckoo clocks, Switzerland is about to get a machine so sophisticated that it will outthink the cyber-attackers targeting its equally famous banking industry. Being developed by IBM and SIX, the Financial Technology Company of Switzerland, this will be the country’s first cognitive security operations centre (SOC) and will help protect the Swiss financial services industry. This will ... Read More »

Defence tech firms helps to buy warships and prepare Navy for threat of future cyber attacks

Royal Navy chiefs have warned of the threat from a cyber attack on warships and submarines as they begin a ten-day exercise with defence technology company Qinetiq. In an effort to boost digital warfare capabilities, the Information Warrior exercise will help the Navy prepare for attacks that it claims are as real as from traditional weapons. As well as defending ... Read More »

Businesses leave gaping holes in cybersecurity plans

Britain’s businesses are increasingly aware of the threat of cyber attacks, but often do not know how to combat digital crimes or how to report attacks. A total of 94pc of firms believe IT security is important, but only 56pc have a strategy in place to deal with it, according to a study from the Institute of Directors and Barclays. ... Read More »

Hackers holding 300 million iCloud account details to ransom raise their price to $700,000, despite assurances from Apple

Hackers behind a criminal attack planned against iCloud and iPhone users say they are still preparing to breach the accounts of up to 750 million users. That’s despite assurances from Apple to customers that their servers are safe. The London-based group – who identify themselves as the ‘Turkish Crime Family’ – has also upped its ransom demands from $75,000 (£60,000) to $700,000 ... Read More »

New GDPR training course endorsed by the Cloud Industry Forum

The Cloud Industry Forum (CIF), the industry body whose aim is to raise standards and improve transparency in the cloud sector, has partnered with Assuredata, a GDPR Practitioner, and Federation Against Software Theft (FAST), to launch a new training scheme to raise awareness to the cloud industry of the requirements to comply with GDPR. Every UK firm has until 25 ... Read More »

Users are aware of app hacking but lack grasp over severity say Promon

A recent survey has revealed that over 25 per cent of British people do not check on the security measures in an app before downloading it, despite the fact that almost 30 per cent believe hackers are likely to use shopping apps such as Amazon or eBay to target their devices. While this demonstrates an increased awareness of the risks ... Read More »

The profit margins benefiting criminals from illegal DDoS services

Kaspersky Lab’s experts have studied the DDoS services available on the black market and determined just how far this illegal business has advanced, as well as the extent of its popularity and profitability. The worrying news is that arranging an attack costs as little as $7 an hour, while the targeted company can end up losing thousands, if not millions, ... Read More »

The download, ransomware-as-a-service explained by Ivanti

Jon Rolls, Vice President of Product Management,
Ivanti

Out of all the potential ransomware variants currently infiltrating the market, they can all be blocked with one simple technique: whitelisting. The trick that some organisations may be missing, is to minimise the admin overhead of setting up a whitelist, and ensuring the vetting of software and privileges are maintained. This Ransomware-As-A-Service trend also highlights common weaknesses of traditional (signature-based) ... Read More »

Apple Tells WikiLeaks to Submit CIA Exploits Through Normal Process

Apple’s initial analysis of the iPhone and Mac exploits disclosed by WikiLeaks on Thursday shows that the vulnerabilities they use have already been patched. The company told WikiLeaks to send the information it possesses through the regular submission process. View full story ORIGINAL SOURCE: Security Week Read More »