Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Mac Malware Appears On The WatchGuard Top Ten Malware List For First Time.

Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet Security Report. The Mac scareware appeared in sixth place in WatchGuard’s latest Q3 2018 report and is primarily delivered by email to trick victims into installing fake cleaning software. The new report also found that 6.8 percent of the world’s top 100,000 websites still accept old, insecure versions of the SSL...

Read more
Threat-Actor Opportunism At Peak During Holiday Season.

Mike Mimoso, Editorial Director, Flashpoint Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, businesses must be aware of the potential for increases in malware attacks against point-of-sale (PoS) systems, the possibility of distributed denial-of-service (DDoS) attacks against popular web-based services, and attempts to bypass fraud-detection systems, to name just a few seasonal risks. All of these are heightened by a month-long increase in online shopping and...

Read more
Markus Braendle.

Extortion Attacks On OT And IIoT Infrastructure Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack We’ve already seen extortion-driven attacks on infrastructure such as cities and ports, which history suggests will continue and spread to energy and transport infrastructure. With the introduction of Industrial Internet of Things (IIoT), manufacturing industry will become a new target. Professional cybercrime is increasingly driven by the simple psychology of extortion, while the almost limitless potential targets...

Read more
Trend Micro Research Uncovers Major Flaws In Leading IoT Protocols.

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today warned organisations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). Trend Micro’s new report, co-branded with Politecnico di Milano, The Fragility of Industrial IoT’s Data Backbone, highlights the growing threat of industrial espionage, denial-of-service and targeted attacks...

Read more
Swivel Secure Launches Updated AuthControl Mobile Version 5.

Multi-factor authentication provider, Swivel Secure, has announced the launch of its new AuthControl Mobile application, Version 5. The new update further enhances security and increased deployment agility for its users. The application has been totally rewritten to provide its users with a better performing core functionality in a even more secure system. The new version of AuthControl Mobile V5 supports several languages according to the configuration of the device, enhancing the user experience and comfort...

Read more

DomainTools, a leader in domain name and DNS-based cyber threat intelligence, recently announced the results of a survey of 1,000 UK consumers, which revealed that 20% of British consumers have been caught out by phishing emails pretending to be from a trusted, legitimate brand, but which in reality are used for malicious purposes such as the theft of PII or the installation of malware on a network. Concerningly, a further 16% of respondents to the...

Read more

2018 has been the year of digital transformation, with organisations of all sizes either implementing or planning projects in every area from customer service operations to workforce management. Every business process is being assessed and within this, print management has also experienced a shift, according to leading enterprise office solution provider, Y Soft Corporation, which believes that 2019 will see digital transformation projects disrupt print management even further. “In 2019, businesses will increasingly focus on...

Read more

Okta, Inc. (NASDAQ:OKTA), the leading independent provider of identity for the enterprise, today announced two new promotional offers that allow VMware Workspace ONE customers to easily take advantage of the Okta Identity Cloud through their local channel partner. These two offers include: Okta for VMware Workspace ONE Advanced: Workspace ONE Advanced customers who are looking to build on their VMware digital workspace capabilities for use cases such as non-employees and cloud apps can now purchase...

Read more
Image of xforce command

RIT Computing Weekend will have an extra special visitor – the new IBM X-Force Command Tactical Operation Center (C-TOC), which will be making its first visit to a university as part of the Nov. 2–4 event. IBM recently announced the C-TOC, the industry’s first fully operational Security Operations Center on wheels, capable of travelling onsite for cybersecurity training, preparedness and response. Housed in a tractor trailer, the center will visit RIT Nov. 2 before continuing...

Read more
Detect and block attacks

Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today announced the release of Netwrix Auditor for Network Devices as a part of the new Netwrix Auditor 9.7 platform. The application enables organisations to detect and investigate network security threats and is targeted at network specialists, IT administrators, IT managers and security analysts. Netwrix Auditor for Network Devices enables organisations to reduce the risk of attackers taking control...

Read more
Page 18 of 19 1 17 18 19