Eskenzi PR ad banner Eskenzi PR ad banner

Top 10 Stories

New malware targeting Apple products mostly affects Chinese users.   The malware "WireLurker", which infects Apple's desktop and mobile operating systems, spreads through apps uploaded from a third-party store and can steal information. WireLurker has the ability to transfer from Apple's Mac computer to mobile devices through a USB cable.   More than 400 infected apps have been downloaded over 350,000 times.   VIEW FULL STORY

Read more

Mobile security breaches are still affecting 41 per cent of UK organisations in the last twelve months. According to a new study from BT, UK businesses are still not taking sufficient security measures to protect themselves against mobile threats, such as lost or stolen devices and malware infections. The report revealed that at least one fifth of respondents’ organisations that suffered a mobile security breach, or experienced more than four incidents in the last year....

Read more

Some 20 million new strains of malware were created worldwide in the third quarter of the year, at a rate of 227,747 new samples every day.   According to PandaLabs, the global infection ratio was 37.93 per cent, slightly up on the previous quarter (36.87 per cent).   Trojans are still the most common type of malware (78.08 per cent of detections), while Trojans also account for most infections during this period, with 75 per cent of the...

Read more

APM Group is working with CESG, the Information Security arm of GCHQ, to deliver its new cyber security training certification scheme.   The CESG Certified Training (CCT) scheme is designed to recognise and assure high quality cyber security training by trainers who deliver courses in cyber security disciplines which are based on the IISP Skills Framework. This includes training which would be suitable for those aspiring to certification under the CESG Certified Professional (CCP) scheme....

Read more

The card system developed by VISA for use in the UK fails to recognise transactions made in non-UK foreign currencies, and can therefore be tricked into approving any transaction up to 999,999.99.   Also, as the cards allow for contactless transactions, wherein consumers need only to have the card in the vicinity of a reader without swiping it, a thief carrying a card reader designed to read a card that’s stored in a wallet or...

Read more

IBM has built an intelligent security portfolio for protecting people, data and applications in the cloud.   Built on its investments in cloud, security and analytics software and services, the Dynamic Cloud Security portfolio addresses the security gaps that can exist between on-premise, cloud, software-as-a-service (SaaS) and mobile applications.   The portfolio is focused on authenticating access, controlling data, improving visibility and optimizing security operations for the cloud. Developed over the past year by 200...

Read more

China will complete and put into service the world's longest quantum communication network.   Believed to be able to stretch 2,000km from Beijing to Shanghai by 2016, the quantum network is considered "unhackable" and will provide the most secure encryption technology to users. This would be extended worldwide by 2030. China is the first major power to come up with a detailed schedule to put the technology into extensive, large-scale use. The South China Morning Post earlier reported...

Read more

The recent data breach at Home Depot cost Alabama credit unions nearly $1 million.   According to a new survey by the Credit Union National Association (CUNA), more than 120,000 credit and debit cards were affected by the high-profile hack. CUNA said the cost of the violation per card issued was $8.02, which includes the amount required for new cards, fraud, additional staffing, member notification, account monitoring and more.   A CUNA survey in January showed the massive Target breach late last...

Read more

The inaugural World Internet Conference will be held in Wuzhen, China in two weeks, where China hopes to show itself as a responsible player.   The November 19th -21st summit is expected to address a philosophy of "Internet sovereignty" with China declaring that the boundaries of Chinese cyberspace are the Government's right to police and defend.   Among the 1,000 guests, officials and luminaries are Internet Corporation for Assigned Names and Numbers (ICANN) chief Fadi Chehade, Alibaba executive...

Read more

Global business risk consultancy Control Risks and information security consultancy MWR InfoSecurity has partnered to bring together the two companies' collective experience and knowledge to help organisations better manage their information security and exposure to cyber attacks.   The service includes strategic intelligence, analysis of specific threats, risk and technical consulting through to implementation of appropriate defences, as well as detection and remediation. It also brings unrivalled experience to mitigate the significant negative impact of...

Read more
Page 435 of 630 1 434 435 436 630