ISIS Hacker using Retail Data

ISIS hacker

US prosecutors are extraditing a Kosovo man now under arrest in Malaysia whom they believe is responsible for assembling an ISIS “kill list” of more than 1,000 military personnel and U.S. government employees. Prosecutors believe Ardit Ferizi hacked into a U.S. retailer, stole sensitive personal information about 1,000+ federal employees and U.S. military staff, and […]

Bugs in Mobile Networks Code Discovered

security-bugs

Mobile networks around the world have been penetrated by criminals and governments via bugs in the code that keeps them running. The security holes have been found in a technology known as Signalling System 7 (SS7), which helps to interconnect mobile networks across the globe. Security experts from Veracode and SQR systems have the following […]

Two Popular Gaming Sites Struck by DDoS Attacks

Gaming Sites Struck by DDoS Attacks

Few days back it was reported that two popular gaming sites, Star Trek Online and Neverwinter Online, were struck by DDoS attacks twice in one day. DDoS expert Igal Zeifman, senior digital strategist for the Incapsula product line at Imperva have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Igal Zeifman, Senior Digital Strategist for the Incapsula Product […]

Traditional Security Tools Delaying Response Capabilities

Security Tools

Survey Reveals that 44% of SANS Community Sharing Breach History Had Sensitive Data Accessed 75 to 96% of Respondents Use Traditional Security Tools Such as Firewalls, IDS, IPS and Anti-Malware TIME is Biggest Challenge Enterprises Face When Trying to Prevent Breaches and Limit Damage SANS, the global leader in information security training and analysis, today […]

Free Privileged Password Security Policy Template

Password Security Policy Template

Global Leader in Next-gen IT Security Solutions Teams with Information Shield to Create Compliance-based Privileged Password Security Policy Template for any Organization Thycotic, a provider of privileged account management solutions for over three thousand organizations world-wide, announced that it has released a free privileged password security policy template for any organization seeking to implement an […]

93% of UK CIOs said IT more Complex than Ever

IT more Complex than Ever

Cloud computing, legacy technology and software licensing cited as biggest contributors to IT complexity Nine out of ten UK CIOs (93%) believe that IT complexity has increased, according to research released by Trustmarque Solutions Limited (“Trustmarque”). The research has revealed that cloud computing (66%), legacy technology (51%) and software licensing (51%) were the biggest contributors […]

Smartphones Hacked Through Voice Command

Smartphones Hacked Through Voice Command

A group of French researchers have discovered that the voice command on smartphones, both iPhone and Android, can easily and silently be controlled by hackers transmitting commands via radio from as far as 16 feet away. [su_note note_color=”#ffffcc” text_color=”#00000″]Mark James, Security Specialist at IT Security Firm ESET : How serious is this and what could […]

Tech Bubbles that Work in Valleys

Tech Bubbles that Work in Valleys

Few places on earth have had more impact on the modern human experience than a small area towards the southern end of the San Francisco Bay, Northern California. The Silicon Valley is the iconic birthplace of some of the world’s most influential tech companies, from Hewlett-Packard to Google, Apple to Intel; the area has redefined […]

Majority of UK Workers Feel Data Theft is “Inevitable”

Majority of UK Workers Feel Data Theft is “Inevitable”

Workers feel more vulnerable to data hacks than they did a year ago Citrix announced new research which reveals that two thirds of workers feel more vulnerable to data hacks than they did a year ago, with the majority (71 per cent) of respondents citing data theft as “inevitable” at some point. The poll, commissioned […]

Security Awareness Computer Based Training – Free of Charge, No Catch

Security Awareness Computer Based Training

In response to customer demand, PhishMe adds CBFree to help organisations meet compliance obligations PhishMe Inc., the leading provider of phishing threat management solutions, confirmed it has introduced Computer Based Training (CBT) modules, available for all to access – completely free of charge. Released in support of Security Serious week and National Cyber Security Awareness […]