Guru's Picks

internet-screen-security-protection-60504

What is it? A man-in-the-middle/spoofing vulnerability exists in Windows 10, Windows Server 2016/2019 – when an authenticated attacker is on the target system, they can use a spoofed code-signing certificate to sign malicious executables making the file appear as if it’s from a trusted source. This vulnerability is post-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could conduct man-in-the-middle attacks and decrypt encrypted traffic such as traffic sent over the...

Read more
robot at computer

A word that has become synonymous with suspicious, illegal or unscrupulous online activity, it is hard to avoid bots being mentioned in one capacity or another in 2020. Now accounting for 50% of online traffic, bots and the legality of bots remains a misunderstood subject. Defined in layman’s terms as an automated tool that mimics human behaviour in order to generate a large amount of traffic, bots can be used for almost anything online, most...

Read more
DeLorean - Back to the future

Tim Mackey, Principal Security Strategist for the Synopsys CyRC (Cybersecurity Research Centre): Politicians, be weary of digital assistants Cyber-attacks on 2020 candidates will become more brazen. While attacks on campaign websites have already occurred in past election cycles, targeted attacks on a candidate’s digital identity and personal devices will mount. With digital assistants operating in an “always listening” mode, an embarrassing “live mic” recording of a public figure will emerge. This recording may not be...

Read more
Password Security

What if I told you that 1.5% of publicly leaked passwords were still being used to sign in to Microsoft accounts? It doesn’t sound like much, but it actually equates to 44 million users still using leaked passwords for their Microsoft accounts. This is what the Microsoft research team found when it performed a scan of its user and Azure AD accounts versus the three billion publicly leaked credentials for the first quarter of the...

Read more
Black Friday Gifts

Black Friday is here, and deals are popping up all over the internet. Consumers are browsing for the most generous discounts, their inboxes flooded with promotional emails alerting them of cheap flights to exotic locations available for a fraction of the cost. But while the prospect of acquiring a new smartphone at a slashed price may appealing, the cybersecurity community is all but confident that things will run smoothly for customers, who will be targeted...

Read more
personal information

4iQ, the leader in Identity Intelligence, today released data from recently completed research focusing on Americans' attitudes about cybersecurity breaches and the efforts that organizations make to mitigate breaches' effects on identity theft. The findings indicate that a large proportion of Americans (44%) believe their personally identifiable information (PII) has been stolen as a result of a data breach. A strong majority (63%) are concerned that prior breaches could lead to future identity fraud, and a significant number (37%)...

Read more
Cyber Security Connect UK

Cyber Security Connect UK (CSC UK), the leading exclusive conference and industry forum for chief information security officers (CISOs) kicks off today (13th November) and runs until 15th November in Monaco. This second edition event will see more than 200 of the UK's top CISOs selected from a range of industries including finance, retail and legal, as well as representatives from government bodies gather to discuss the most current cand challenging cybersecurity trends. The exclusive annual event is...

Read more
Dr Leila Powell, Lead Security Data Scientist, Panaseer

As a data scientist I cannot solve business problems if appropriate data is not available. However, this is the situation faced by security leaders on a daily basis – they have to make strategic decisions, which will impact their cyber security posture, without having access to the  insights they need. How can they overcome the twin challenges of a lack of visibility (not enough of the right information) and a lack of confidence (untrusted information)?...

Read more
Page 1 of 7 1 2 7