Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

fraud

Kount, a leading supplier of fraud protection and sales boosting technology, today revealed three current tends converging to create the perfect storm of fraud, along with tips that both vendors and consumers can use to protect themselves. Kount’s “Perfect Storm of Fraud” eBook takes a look at how new, emerging technologies that claim to make transactions safer and protect consumer information can actually have the adverse effect, putting businesses and consumers alike at even greater...

Read more

FireEye, the leader in stopping today’s advanced cyber attacks, introduces an overview of the threat landscape in the UK for the first half of 2015 in its Regional Advanced Threat Report (ATR) for EMEA. FireEye has examined the activity, attempts and targets of different Advanced Persistent Threats (APT) in the first six months of this year. The report is based on data from the FireEye Dynamic Threat Intelligence™ (DTI™) cloud and highlights the growing footprint...

Read more

UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate policies according to research released today by WinMagic Inc. The survey, conducted by CensusWide, of 1,000 office workers in organisations of 50 or more employees revealed widespread, and often unilateral employee use of cloud storage services could be leaving businesses with poor visibility of where their data is...

Read more

A new survey from Lieberman Software Corporation revealed that 92 percent of IT security professionals believe that cyber security drills are a good way to prepare for cyber attacks. However, 63 percent of those surveyed admitted that their organisations never run such drills, or only do so annually. The study was carried out at Black Hat Conference 2015, and looked at the attitudes of nearly 150 IT security professionals. It also revealed that only 11 percent of organisations...

Read more

Imperva, Inc. (NYSE:IMPV) committed to protecting business-critical data and applications in the cloud and on-premises, today unveiled its latest Hacker Intelligence Initiative (HII) Report: “Phishing Trip to Brazil.” This new report, published by the Imperva Application Defense Center (ADC), offers a detailed look at a cyber attack targeting consumers using a banking Trojan, and shows how consumer-centric cyber crimes can compromise the enterprise. The report also demonstrates that despite potential anti-malware defenses, attacks that target...

Read more
attack

Kaspersky Lab warns about the activity of an Arabic-speaking cyber-criminal group given the name ‘The Gaza cyber-gang’ by the cybersecurity experts. It is operating in the Middle East and North Africa  (MENA) region,  mainly in Egypt, the United Arab Emirates and Yemen. The group has been operating since 2012 and became particularly active in the second and third quarters of 2015. The attackers focus on government entities, especially embassies, and primarily target information technology (IT)...

Read more

If security researchers get no response from manufacturers when disclosing vulnerabilities with life-threatening implications, the majority of IT security professionals (64%) believe that the information should then be made public, according to new research conducted by Unified Security Management™ leader AlienVault™. More than 650 IT security professionals were surveyed at the Black Hat 2015 Conference in Las Vegas and asked what was the best course of action when a vulnerability is found on an internet-connected device that...

Read more
finance

Thales, leader in critical information systems and cybersecurity, announces the publication of its 2015 PKI Global Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals an increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, supporting a growing number of applications. At the same time, however, there is a general lack of clear PKI ownership, as well as a lack of resources and skills to...

Read more

It seems like phishing and spear phishing are constantly in the news, usually accompanied by an announcement of yet another major data breach! The first recorded phishing event occurred in the mid-1990's, and the attacks have grown in scope and sophistication as technology has improved over the past twenty years. OPSWAT thought it would be interesting to research the history of phishing; the results are in the infographic below, alongside some of the latest phishing statistics and prevention measures.  

Read more

IBM today announced new cloud security technology that helps safeguard the increasing use of “bring your own” cloud-based apps at work. Cloud Security Enforcer is the first technology to combine cloud identity management (Identity-as-a-Service) with the ability for companies to discover outside apps being accessed by their employees, including those they are using on their mobile devices. These combined capabilities result in the ability for companies to enable their workforce with a secure way to...

Read more
Page 181 of 296 1 180 181 182 296