A New Class of DDoS Amplification Attack

DDoS Amplification Attack

Security watchers have warned about a new class of DDoS amplification attack threat which only exists because too many users are failing to follow basic safeguards. Improperly configured services such as DNS or Network Time Protocol (NTP) have been exploited to launch a string of DDoS attacks over the last couple of years, the most […]

How to Choose the Right Web Vulnerability Scanner?

Web Vulnerability Scanner

Recently we can see every day in the news headlines “Cyber-Security Breaches” or “Cyber Attacks”. Attackers can come from anywhere, at any time, whatever your company size or type is targeted. According to the global study by PwC, volume of cyberattack grew up to 48 % in 2014. Everything about the way we work, play, […]

The worldwide cybersecurity market is defined by market sizing estimates that range from $77 billion in 2015 to $170 billion by 2020

The Cybersecurity Market Report, Q3 2015 is now available and provides comprehensive coverage on the business of cybersecurity. Inside the Q3 Report: – Global Cybersecurity Market Sizings and Forecasts – Cybersecurity Market by International Regions – Cyber Insurance Market Data – Cybersecurity Jobs Report – Profile on IBM Security – Managed Services & MSSP Report […]

Around 9 in 10 Brits Don’t Secure Devices when Connecting to WiFi Abroad


Intel Security encourages those travelling abroad to think ‘Slip-Slap-Slop-Secure’ to stay safe this summer Nearly half (47%) do not know how to protect their devices when connecting to an open Wi-Fi network when abroad Over a third (38%) of respondents would connect to an open Wi-Fi network when on holiday 13% of Brits would share […]

Stolen User Data Published by Hackers

Customer Data has been Stolen

Following the infamous Ashley Madison hack, in which hackers have released the personal data of thousands of people who used the adultery website. Security experts from Rapid7, Tripwire and Lieberman Software explains that “Hacktivist groups are more likely than general cybercriminals to share information on vulnerable sites and intended targets.” [su_note note_color=”#ffffcc” text_color=”#00000″]Tod Beardsley, Security Engineering Manager, Rapid7 :  “Curiosity seekers, suspicious […]

Remote Access Security in Windows 10

Remote Access Security in Windows 10

When Microsoft finally released its long-awaited Windows 10 operating system in late July, the information security community immediately issued assessments of Microsoft and how well its new security features would protect users. Leading the way is the new Device Guard feature, which prevents applications from running unless they originate from the Windows Store, specific vendors […]

5 Necessary Precautions Relating to IT Security for kids

IT Security for kids

ESET Ireland reminds that with schools soon resuming their activities it’s time to take the necessary precautions relating to IT security for kids. Sharing photos, videos, status updates, messages and other types of information are part of daily life for children and teenagers, and when they return to school their smartphone usage is only bound to […]

Large Enterprises: Get Serious About Security Automation

Automate or Suffer the Consequences

The Nexus of Forces has introduced a Nexus of Danger, and security pros must face it head on through security automation. Large enterprises have a lot of systems to secure. Some are legacy ancients operating on long-forgotten and undocumented magic. Others are merely middle aged, quietly thumping along and getting the job done with patches […]

Forced to Reset all Users Password after Major Hack Attack

Reset all Users Password

News has broken that Mumsnet has reset its users’ passwords after a series of attacks, one of which involved armed police being called out to the London home of the parenting site’s co-founder. Hacker gained access to the site’s administrative functions and hijacked some accounts. There had also been an attempt to force Mumsnet offline […]

Is the Risk of a Flat Tyre Similar to Cyber Security Risk?

Is the risk of a flat tyre similar to Cyber Security risk?

We have all come across scenarios throughout our lives where we have something we know we should be doing but decide it’s not quite a pressing issue- that is until it goes wrong, horribly wrong and we end up wishing we’d done something sooner. This is true for many things; from a car with a […]