Eskenzi PR ad banner Eskenzi PR ad banner

Editor's News

New research has forecast that mobile data traffic, generated by Smartphones, Featurephones and Tablets, will approach almost 197,000 PB (Petabytes) by 2019, equivalent to over 10 billion Blu-ray movies, according to Juniper Research. The research, Mobile Data Offload & Onload: Wi-Fi, Small Cell & Network Strategies 2015-2019 estimates that the average monthly data usage by smartphone and tablet users will double over the next four years. The daily media consumption by mobile users will continue...

Read more

Register now to attend the IT Security Guru CISO Debate hosted by the IT Security Guru and learn from the UK’s industry experts, taking place 9th June 2015 at the Melia White House Hotel, London.  Register here to secure your place. Sessions commence at 2pm and include:  Top 10 ways to build a security awareness programme that works Thom Langford, Director – Global Security Office, Sapient Vicki Gavin, Compliance Director, Head of Business Continuity & Information Security...

Read more

The Syrian Electronic Army has hacked the Washington Post mobile site. According to reports, visitors to the Post's mobile site (m.washingtonpost.com) were presented with pop-up messages saying "You've been hacked by the Syrian Electronic Army." The attack is as a result of a flaw in Washington Post content-delivery partner, Instart Logic. According to the Washtington Post, Instart Logic is currently investigating the break-in. Washington Post chief information officer Shailesh Prakash said Thursday's attack affected the...

Read more

Corporate investment in social media is on the rise, but most organizations still do not understand the scope and scale of the risks, according to research. Over the course of one year, Proofpoint Nexgate research team examined Fortune 100 social media pages—including Facebook, Twitter and LinkedIn—and identified how frequently regulated and sensitive information is exposed. They found that the average Fortune 100 company had approximately 70 compliance issues on their branded social media pages. Of...

Read more

New research suggests that the cost of data breaches will increase to $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015. The research from Juniper 'The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation', found that the majority of these breaches will come from existing IT and network infrastructure. While new threats targeting mobile devices and the IoT (Internet of Things) are being reported at an...

Read more

A new crypto ransomware threat that uses the ‘Los Pollos Hermanos’ branding image found in the show ‘Breaking Bad’ has been discovered. Currently infecting computers in Australia, the malware encrypts images, videos, documents, and more on the compromised computer and demands up to AU$1,000 (US$791) to decrypt these files. Discovered by Symantec, the malware arrives through a malicious zip archive, which contains a malicious file called ‘PENALTY.VBS’ (VBS.Downloader.Trojan) which when executed, downloads the crypto ransomware onto the...

Read more

IoActive's researchers have identified some new flaws in Lenovo's system update service that can be used by hackers to create fake certificates for executable files. IOActive detailed three separate vulnerabilities that hackers could bypass checks to ensure the integrity of apps, allowing them to run malware on an affected Lenovo machine. "An attacker can create a fake and use it to create a code-signing certificate, which can then be used to sign executables," the advisory says....

Read more

IT security company High-Tech Bridge has identified a remote code executivion vulnerability in the Wordpress shopping cart plugin eShop, which can influence the execution of code and open back doors into 10,000+ live WordPress websites for hackers to exploit. “The vulnerability exists due to insufficient validation of user-supplied input in “eshopcart” HTTP cookie,” according to the advisory from High-Tech Bridge. “In this case we can only overwrite string variables within the scope of 'eshop_checkout()' function in...

Read more

The Hard Rock Casino in Las Vegas has suffered a data breach, leading to the compromise of credit card data, names and addresses at restaurant, bar and retail locations. In their statement, the Hard Rock Casino said the attack “was limited to credit or debit card transactions between September 3rd, 2014 and April 2nd, 2015 at restaurant, bar and retail locations at the Hard Rock Hotel Las Vegas property, including the Culinary Dropout Restaurant.” The Hard...

Read more

Arbor Networks,a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, has released its Q1 2015 global DDoS attack data that shows a continuation of extremely high volume attacks, including the largest attack ever recorded by Arbor’s ATLAS threat intelligence infrastructure, a 334Gbps attack targeting a network operator Asia. In Q1 2015, there were 25 attacks larger than 100Gbps globally. In the past year, Arbor has documented a dramatic increase...

Read more
Page 194 of 296 1 193 194 195 296