Malware Attack that put Users at Risk

Users at Risk of Malware

Match.com, is at risk from malware which could steal personal information, send spam emails and operate silently within their devices without their consent. Visitors to the site are at risk from malware which could steal personal information, send spam emails and operate silently within their devices without their consent. Website visitors are also at risk […]

Shifu Trojan Hits 14 Banks in Japan

Trojan

“Shifu Banking Trojan” by IBM security researchers, a dangerous new banking Trojan with a range of malicious capabilities has affected at least 14 banks in Japan and could be used to attack banks in other regions as well. Ken Westin, senior security analyst for tripwire commented on the new banking trojan is attacking 14 japanese […]

Vulnerable Gambling Apps put Corporate Data at Risk

Vulnerable Gambling Apps

Mobile apps increase enterprise attack surface and put sensitive corporate data at risk, according to analytics from Veracode’s cloud-based security platform Veracode, a leader in protecting enterprises from today’s pervasive web and mobile application threats, released analytics from its cloud-based platform showing that, based on its analysis of hundreds of thousands of scans of mobile […]

Finance and HR: Biggest Data Security Risk

Biggest Data Security Risk

Security professionals profile who is most likely to lose sensitive data to help inform security strategies Mid-career professionals were also a higher risk Most workers more likely to cause accidental breach than malicious attack Finance and HR departments, and the people working in them, represent the biggest information security threat to business, according to global […]

Almost a Third of Organisations Unable to Detect Intruders on Network

Detect Intruders on Network

New Lieberman Software study reveals organisations are relying on traditional IT security solutions to protect against modern day cyber attacks A new survey from Lieberman Software Corporation revealed that 83 percent of IT security professionals are still confident that their perimeter security tools, like firewalls, can react quickly enough to defend against today’s sophisticated cyber […]

Top Tips for SIP Trunking

The decision to move to SIP trunking appears straightforward: reduced costs, greater scalability, improved disaster recovery options and access to the productivity benefits enabled by Unified Communications (UC).  But, as ever in the world of technology, the truth about SIP trunking is a little more complex than it may appear at first glance. Despite the […]