KeyRaider iOS Malware Affects Jailbroken iOS Devices

jailbroken iOS devices

Guillaume Ross, Senior Security Consultant, Strategic Services, Rapid7 commented on the latest news that more than 225,000 Apple accounts have been stolen by sophisticated malware that targets modified iOS devices, according to Palo Alto Networks. [su_note note_color=”#ffffcc” text_color=”#00000″]Guillaume Ross, Senior Security Consultant, Strategic Services, Rapid7 : “The KeyRaider iOS Malware discovered by WeipTech and researched […]

Hackers Watch Child over Camera Monitor

Hackers Watch Child over Camera Monitor

Bryan Lillie, Chief Technical Officer, Cyber Security, QinetiQ commented on the Baby monitor hack. [su_note note_color=”#ffffcc” text_color=”#00000″]Bryan Lillie, Chief Technical Officer, Cyber Security, QinetiQ : “We are still a long way from makers of connected devices appreciating the security risks, let alone users appreciating them. Expect to see a lot more of these flaws exposed […]

Five Years of Hardware and Software Threat Evolution

Threat Evolution

Report provides five-year threat retrospective, GPU malware assessment, and techniques for exfiltrating data from corporate networks; ransomware rises 127% from Q2 2014 to Q2 2015 Intel® Security today released its McAfee Labs Threats Report: August 2015, which includes a critique of graphics processing unit (GPU) malware claims, an investigation of the top cybercriminal exfiltration techniques, […]

The Cost of Malware Containment

Malware Containment

The volume and severity of threats is increasing every year, which means that it’s more important than ever to detect active infections swiftly. However, achieving this against the ever growing mountain of security alerts that teams now face is a significant challenge. Balancing the limitations of both staffing and budgets against the sheer volume of […]

Automatic Protection of Sensitive Applications Over any Network

Automatic Protection of Sensitive Applications

CryptoFlow Solutions Protect Any Enterprise Application for Any User on Any Device over Any Network Certes Networks, a leading innovator in software-defined security solutions to protect enterprise applications, today announced the company’s award-winning CryptoFlowÒ product suite supports Crypto-Segmentation, enabling end-to-end protection of sensitive enterprise applications both inside and outside the traditional enterprise perimeter. Certes CryptoFlows […]

Top 5 IT Security Audit Questions

IT Security Audit Questions

Netwrix lists the most common compliance questions asked by auditors Many organisations still fail to provide answers to fairly simple questions asked by external IT auditors, according to Netwrix. Despite popular frameworks designed to help companies pass compliance audits, according to the 2015 Verizon PCI Compliance Report, around 80% of companies still failed to comply […]

Authentication Solution for Microsoft Office 365

Authentication Solution for Microsoft Office 365

News Highlights: Retailers can improve service and enhance security by enabling floor staff to access the information they need by simply tapping a smart card to their tablet. Healthcare organisations simplify electronic prescription signing and enterprise users have easier access to cloud applications as HID Global and Microsoft continue to collaborate on improving the security-enhanced […]

Beware the Missing Patch

Beware the Missing Patch

How regular software patching checks can help a business stay breach free Software patching across an IT estate is a bit like taking a car for its annual service: you know you should do it, but it can often lead to unpleasant surprises, exposing a range of unexpected problems which need to be fixed. Not […]