Responds to IE Zero Day Vulnerability

IE Zero Day Vulnerability

Microsoft ran out of time, imposed by HP’s Zero Day Initiative (ZDI)  to fix four critical security vulnerabilities in the mobile edition of Internet Explorer, Cris Thomas, strategist of Tenable Network Security commented on the IE Zero day vulnerability. Cris Thomas, Strategist of Tenable Network Security : “Unfortunately two of the big kids in our industry […]

To Invoke or not to Invoke? That is the question when it comes to DR


NYSE technical glitch highlights concerns as to when an organisation should invoke its DR plans Deciding whether to failover to a secondary site or wait it out and fix the problem in-house still remains one of the toughest decisions businesses face during an outage. This is according to Oscar Arean, technical operations manager from disaster […]

ID Theft-Protection Firm Fails at Protecting Data

Customers who hired the infamous ID theft-protection firm Lifelock to monitor their identities after their data was stolen in a breach were in for a surprise. It turns out Lifelock failed to properly secure their data. Ken Westin, Senior Security Analyst, at Tripwire commented on the Theft-Protection firm lifelock. Ken Westin, Senior Security Analyst, Tripwire […]

Mobile Security and 3 Ways IT Departments Can Make BYOD Safer

Whether it’s the use of corporate or personal mobile devices in the workplace, and whether there’s a corporate bring your own device (BYOD) policy or not – mobile devices bring a hornet’s nest of security issues for IT departments to consider and address. It is a two-part security issue, with a certain degree of overlap […]

Joins keynote line-up at IP EXPO Europe 2015 to Discuss the Truth About Privacy

IP EXPO Europe

Renowned ‘whistleblower’ to present his views LIVE via satellite to Andrew Neil, on the state and future of national cyber security Renowned former NSA employee Edward Snowden will deliver a keynote speech this year at Europe’s number one IT event, IP EXPO Europe 2015, taking place at London’s ExCel. Joining the event live via satellite […]

Discovers Google Drive-Based Phishing Campaign

Google Drive-Based Phishing Campaign

Attackers Fooled Google Spam Engine With Phishing Emails That Lured Victims to Google Drive-Hosted Malicious Web Pages Used to Steal Users’ Credentials Elastica (, the leader in Data Science Powered™ Cloud Application Security, released findings around a new Google Drive-based advanced phishing campaign initiated by unknown attackers. The attackers used JavaScript code obfuscation and compromised […]

Stagefright bug : “This is heartbleed for mobile”

You may have seen news that a vulnerability has been discovered in Android software Stagefright, which lets attackers send malware directly to any device where they know the phone number. Chris Wysopal, CISO and CTO at Veracode, the application security specialists commented on the news that a vulnerability has been discovered in Android software Stagefright. […]