Friday , 20 July 2018
Home » Tag Archives: Technology (page 20)

Tag Archives: Technology

Authentication is imperfect, but passwords are not going away

Jonathan Bennun, Product Strategy,

As a hacker, I found vulnerabilities like easy-to-guess passwords made my work much easier. If that attack vector didn’t pan out, I could usually get around the authentication flow, or gain basic privileges and escalate them for admin access. We must accept that these vulnerabilities – imperfect authentication and passwords – are not going away anytime soon, and businesses must ... Read More »

The Software Economy’s unquenchable thirst for data

Iain Chidgey, VP and General Manager International,

We live in a world where software is everywhere. It underlies almost every aspect of our personal and professional lives. Cloud connectivity, omnipresent networks and connected devices have transformed how we do mundane tasks. What used to take weeks and days, now takes minutes and seconds. As the pace of change has accelerated, it’s placed businesses under immense pressure. The ... Read More »

How to Pursue a Career in Ethical Hacking

Danish Wadhwa

Ethical hacking is a new way of looking at hacking which is used to finding weak spots in the program or system for the purpose of testing and fixing those weak points. It is normally performed by skilled developers or by a system knowledgeable person. Few people think that ethical hacking is illegal. Over the past few years, with the ... Read More »

UNICEF setup new initiative with cryptocurrency helping children in Bangladesh

UNICEF Australia wants you to fund its charitable missions using your computer’s processing power. The UN program that provides humanitarian and developmental assistance to children and mothers in developing nations has now launched The Hope Page, which allows the users to donate to its cause by mining cryptocurrency. View Full Story ORIGINAL SOURCE: The Next Web Read More »

City of London Police taking proactive step to counter cyber threat

The City of London Police is launching a drive to make the Square Mile more resilient to cyber attacks, as the financial services sector sharpens its focus on defending against online criminals. View Full Story  ORIGINAL SOURCE: FN London Read More »

Certain German Car Manufacturers Vulnerable to Remote Hacking

A Dutch cyber-security firm has discovered that in-vehicle infotainment (IVI) systems deployed with some car models from the Volkswagen Group are vulnerable to remote hacking. Daan Keuper and Thijs Alkemade, security researchers with Computest, said they successfully tested their findings and exploit chains on Volkswagen Golf GTE and Audi A3 Sportback e-tron models (Audi is a brand part of the ... Read More »

From underdog to influencer: the dramatic transformation of the IT team

Rajesh Ganesan, Director,

IT has emerged as a business enabler in the UK; recent research from ManageEngine reveals that UK companies are excelling at aligning their overall business with IT. While business professionals working outside of the IT department are reportedly exhibiting strong IT knowledge, IT managers are also showing a greater understanding of their business as a whole. The survey results gathered ... Read More »

What does a DDoS attack sound like?

Ever wondered what a DDoS attack sounds like? Well now is your chance to find out. In a new blog post, researchers from Imperva showcase of a recent project around the sonification of DDoS attacks. In the project, Imperva researchers turned web traffic into sound and transmitted the whole thing over internet radio, which to their surprise turned out to ... Read More »

Traditional security defences may prove inadequate for effective GDPR strategies, warns Aruba

Companies risk falling foul of incoming GDPR regulations by relying on existing, piecemeal security measures, according to a new whitepaper published today by Aruba, a Hewlett Packard Enterprise company.   The majority of existing defences, which use pattern matching techniques to find threats, are unable to detect new attacks that use legitimate user credentials to access sensitive information, meaning that ... Read More »

Take back the initiative on DDoS protection – it’s time to be proactive

Ronald Sens, EMEA Director,
A10 Networks

Since Mirai and its subsequent variants let the genie out of the bottle, DDoS attacks powered by the Internet of Things have become ubiquitous. As more and more IoT devices join the world’s networks – predicted by Gartner to be 24 billion by 2020 – so the potential for cybercriminals to recruit unsecured devices to botnets and wreak havoc through ... Read More »