A New Class of DDoS Amplification Attack

DDoS Amplification Attack

Security watchers have warned about a new class of DDoS amplification attack threat which only exists because too many users are failing to follow basic safeguards. Improperly configured services such as DNS or Network Time Protocol (NTP) have been exploited to launch a string of DDoS attacks over the last couple of years, the most […]

How to Choose the Right Web Vulnerability Scanner?

Web Vulnerability Scanner

Recently we can see every day in the news headlines “Cyber-Security Breaches” or “Cyber Attacks”. Attackers can come from anywhere, at any time, whatever your company size or type is targeted. According to the global study by PwC, volume of cyberattack grew up to 48 % in 2014. Everything about the way we work, play, […]

The worldwide cybersecurity market is defined by market sizing estimates that range from $77 billion in 2015 to $170 billion by 2020

The Cybersecurity Market Report, Q3 2015 is now available and provides comprehensive coverage on the business of cybersecurity. Inside the Q3 Report: – Global Cybersecurity Market Sizings and Forecasts – Cybersecurity Market by International Regions – Cyber Insurance Market Data – Cybersecurity Jobs Report – Profile on IBM Security – Managed Services & MSSP Report […]

Around 9 in 10 Brits Don’t Secure Devices when Connecting to WiFi Abroad


Intel Security encourages those travelling abroad to think ‘Slip-Slap-Slop-Secure’ to stay safe this summer Nearly half (47%) do not know how to protect their devices when connecting to an open Wi-Fi network when abroad Over a third (38%) of respondents would connect to an open Wi-Fi network when on holiday 13% of Brits would share […]

Stolen User Data Published by Hackers

Customer Data has been Stolen

Following the infamous Ashley Madison hack, in which hackers have released the personal data of thousands of people who used the adultery website. Security experts from Rapid7, Tripwire and Lieberman Software explains that “Hacktivist groups are more likely than general cybercriminals to share information on vulnerable sites and intended targets.” [su_note note_color=”#ffffcc” text_color=”#00000″]Tod Beardsley, Security Engineering Manager, Rapid7 :  “Curiosity seekers, suspicious […]

Remote Access Security in Windows 10

Remote Access Security in Windows 10

When Microsoft finally released its long-awaited Windows 10 operating system in late July, the information security community immediately issued assessments of Microsoft and how well its new security features would protect users. Leading the way is the new Device Guard feature, which prevents applications from running unless they originate from the Windows Store, specific vendors […]

5 Necessary Precautions Relating to IT Security for kids

IT Security for kids

ESET Ireland reminds that with schools soon resuming their activities it’s time to take the necessary precautions relating to IT security for kids. Sharing photos, videos, status updates, messages and other types of information are part of daily life for children and teenagers, and when they return to school their smartphone usage is only bound to […]