Eskenzi PR ad banner Eskenzi PR ad banner

Featured

The latest collection of expert opinions, news analysis and featured contributions from the IT security community

Armor Warns E-Commerce Retailers of Increased Attacks; Magecart-Style, Credit Card Sniffing Attack Tool Now On Sale in the Dark Web

Armor, a leading cloud security solutions provider, has found what it believes to be the first Magecart-style (credit card sniffing) attack tool to be openly offered for sale on the Dark Web. Previous Magecart-style attacks, (such as the British Airways and Newegg attacks for example), have been carried out by specific threat groups who have, from all accounts, used their own proprietary payment card sniffing tool and not a sniffing tool which has been openly...

Read more
Attempted ID Fraud Increased 22 Percent Worldwide During 2018 Black Friday/Cyber Monday Stretch.

New data from Jumio, the leading AI-powered trusted identity as a service provider, reveals that online ID fraud attempts on government-issued IDs increased 22 percent worldwide during the 2018 Black Friday to Cyber Monday period compared to the non-holiday average. Surprisingly, attempted ID fraud perpetrated during the online identity verification stage, involving passports, driver’s licenses or ID cards, hit a five-year high, increasing 109 percent in 2018 from 2014. In the second edition of Jumio’s...

Read more
Have Yourself A Merry AI Christmas.

· Only 20% of people say they would trust AI to help them run their perfect Christmas Day · Yet 84% are already planning on using AI-powered technologies this holiday season New research from Accenture finds that artificial intelligence (AI) will play a role in Christmas for 84 per cent of people this year. The survey of 2,000 people in the UK found almost two thirds (60 per cent) don’t realise they will be using...

Read more
Ponemon-Tenable Study Find 60% Of Organisations Suffered Two Or More Business-Disrupting Cyber Events In Last 24 Months.

Tenable®, Inc., the Cyber Exposure company, today released the Measuring and Managing the Cyber Risks to Business Operations Report, an independent study conducted by Ponemon Institute. It found that 60 percent of organisations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and operational equipment — in the last 24 months. Further, the vast majority of respondents (91...

Read more
BT To Deliver The Latest SD-WAN And Cyber Security Service For IXOM.

BT today announced that it has signed a contract to deploy a new generation of network technology for IXOM, a market leader in chemicals manufacturing and distribution in Australia and New Zealand. It will see IXOM benefit from BT’s latest software-defined wide area networking (SD-WAN) and cyber security managed services as it shifts applications and data to the cloud to drive agility, efficiency and innovation. IXOM’s new network will connect over 1000 employees at 55...

Read more
Mac Malware Appears On The WatchGuard Top Ten Malware List For First Time.

Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet Security Report. The Mac scareware appeared in sixth place in WatchGuard’s latest Q3 2018 report and is primarily delivered by email to trick victims into installing fake cleaning software. The new report also found that 6.8 percent of the world’s top 100,000 websites still accept old, insecure versions of the SSL...

Read more
Threat-Actor Opportunism At Peak During Holiday Season.

Mike Mimoso, Editorial Director, Flashpoint Attackers’ opportunism is never higher during the year than in the holiday shopping season. As a result, businesses must be aware of the potential for increases in malware attacks against point-of-sale (PoS) systems, the possibility of distributed denial-of-service (DDoS) attacks against popular web-based services, and attempts to bypass fraud-detection systems, to name just a few seasonal risks. All of these are heightened by a month-long increase in online shopping and...

Read more
Markus Braendle.

Extortion Attacks On OT And IIoT Infrastructure Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack We’ve already seen extortion-driven attacks on infrastructure such as cities and ports, which history suggests will continue and spread to energy and transport infrastructure. With the introduction of Industrial Internet of Things (IIoT), manufacturing industry will become a new target. Professional cybercrime is increasingly driven by the simple psychology of extortion, while the almost limitless potential targets...

Read more
Trend Micro Research Uncovers Major Flaws In Leading IoT Protocols.

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today warned organisations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). Trend Micro’s new report, co-branded with Politecnico di Milano, The Fragility of Industrial IoT’s Data Backbone, highlights the growing threat of industrial espionage, denial-of-service and targeted attacks...

Read more
Swivel Secure Launches Updated AuthControl Mobile Version 5.

Multi-factor authentication provider, Swivel Secure, has announced the launch of its new AuthControl Mobile application, Version 5. The new update further enhances security and increased deployment agility for its users. The application has been totally rewritten to provide its users with a better performing core functionality in a even more secure system. The new version of AuthControl Mobile V5 supports several languages according to the configuration of the device, enhancing the user experience and comfort...

Read more
Page 68 of 69 1 67 68 69