Tuesday , 21 November 2017
Home » Tag Archives: Technology (page 77)

Tag Archives: Technology

Intercede and Centrify partner to streamline secure mobile access for highly regulated enterprises

Today, cybersecurity and identity management expert Intercede announces a partnership with Centrify, the leader in securing hybrid enterprises through the power of identity, to secure and manage mobile access in highly regulated industries who must comply with Homeland Security Presidential Directive 12 (HSPD-12), FIPS 201-2 and NIST 800-157. Interecede’s MyID enables enterprises to replace employee passwords with more secure and ... Read More »

Trust trumps price in business decision making, with information security crucial to building trust

Trust is so important in the corporate world that it can make or break business deals. This is one of the findings of a recent study from Iron Mountain®, the leading storage and information management services company. The study found that the majority of business leaders see customer trust (91%) or partner trust (88%) in their organisation as valuable and ... Read More »

Financial services firms prepare for influx of new cybersecurity regulations, according to survey from Duff & Phelps

86% of financial services firms intend to increase the time and resources they spend on cybersecurity in the next year, according to new research from Duff & Phelps, the premier valuation and corporate finance advisor. The survey of nearly 200 senior financial services professionals shows that firms are preparing to implement more stringent cybersecurity measures in response to increasing regulatory ... Read More »

Don’t be a fool about endpoint protection

Kurt Wescoe, Chief Architect,
Wombat Security Technologies

In the U.S., 35 percent of working-age adults do not know what phishing is. Considering the average office worker can see up to one risky email a day, that’s quite alarming. Clearly, this awareness gap is putting both business data and systems at risk. Factoring end users into the endpoint protection equation just makes sense. Discussions about phishing prevention are ... Read More »

New Bill Aims to Ban Warrantless Phone Searches at the US Border

A bipartisan and bicameral bill will make it unlawful for officials to search a phone, laptop, or social media accounts of Americans and lawful permanent residents at the border without a warrant. The lawmakers want the bill to prevent Americans from being delayed or foreign nationals — who are allowed to live permanently in the US — from being denied ... Read More »

Kim Jong-un’s ‘Hackers Target Banks in up to 18 Countries for Cash to Spend on North Korea’s Terrifying Nuclear Programme’

North Korean cyber attackers have targeted banks in 18 countries with Pyongyang using the money to boost its terrifying nuclear programme, security experts have claimed. A hacking operation known as Lazarus has targeted financial institutions in Europe, Central and South America, Africa, India and the Middle East, according to Russian researchers. Cyber security firm Kaspersky Lab said it had obtained ... Read More »

Samsung Gear S3 Frontier WARNING – Popular Device Could Trigger Malware ‘EPIDEMIC’

The software that powers the Samsung Gear S3 Frontier has been likened to a “hackers’ dream”, following the shocking revelation from Israeli researcher Amihai Neiderman that the Tizen operating system was “the worst code” he had seen. Samsung Gear S3 Frontier owners might be feeling a little nervous this morning, following a keynote address by Israeli researcher Amihai Neiderman. Mr Neiderman ... Read More »

Russian Banking Machine Theft Leads Investigators to ATMitch Malware

Kaspersky Lab on Tuesday revealed further details about a memory-only “fileless malware” campaign that a cyber-criminal organisation has been employing to steal money remotely from ATMs while leaving behind virtually no trace of malicious activity. According to a Securelist blog post, the primary payload used in the cyber-heists is ATMitch, a malware capable of issuing a variety of commands to compromised ATM machines, including ... Read More »

How Hackers Hijacked a Bank’s Entire Online Operation

The traditional model of hacking a bank isn’t so different from the old-fashioned method of robbing one. Thieves get in, get the goods, and get out. But one enterprising group of hackers targeting a Brazilian bank seems to have taken a more comprehensive and devious approach: One weekend afternoon, they rerouted all of the bank’s online customers to perfectly reconstructed ... Read More »

Survey highlights downtime as a key cost of ransomware attacks

Imperva, Inc., have announced the results of a survey of 170 security professionals taken at RSA 2017, the world’s largest security conference, exploring their experiences with ransomware. Thirty-two percent of respondents said their company had been infected with ransomware with 11 percent taking longer than a week to regain access to their systems after an attack. According to CNN, in ... Read More »