Cyber Insurance Premiums Rocket after High-Profile Attacks

Cyber Insurance Premiums

A rash of hacking attacks on U.S. companies over the past two years has prompted insurers to massively increase cyber premiums for some companies, leaving firms that are perceived to be a high risk scrambling for cover. On top of rate hikes, insurers are raising deductibles and in some cases limiting the amount of coverage […]

New Android Malware Floods Devices with Ads After Posing as Legit Apps

New Android Malware Floods Devices

Newly discovered Android malware dubbed Kemogeis capable of flooding infected devices with unwanted advertisements. The malware is seeded in what looks like legitimate apps that are being offered on third-party app stores, with users being tricked into installing the Kemoge-containing apps through advertisements. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire […]

XcodeGhost Used to Hack Apple iOS and OS X


Recently, Chinese iOS developers have discovered a new OS X and iOS malware that has appeared in malicious versions of Xcode, Apple’s official toolkit for developing iOS and OS X apps. The hack of Apple’s Xcode involves infecting the compiler with malware and then passing that malware onto the compiled software.  This is a unique […]

Brolux Trojan Targeting Japanese Online Bankers

Brolux Trojan Targeting Japanese Online Bankers

A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer discovered in late 2014. Both exploits are (still) distributed through an adult website and try […]

Social Media Meets Customer Care – Tweeters Beware

Social Media Meets Customer Care

Many organizations are turning to a new mechanism to deliver customer care: social media. A preferred communication channel for many consumers, social media provides a low-cost model for the business to respond to inquiries. However, any time a communication link between a business and consumers appears, bad actors and criminals look for ways to take […]

Achieving Certification for Immediate Availability in the Microsoft Azure Marketplace

Microsoft Azure Marketplace

Microsoft Azure customers worldwide have immediate access to award-winning data-centric information security solution Watchful Software, a leading provider of data-centric information security solutions, announced that its award-winning information security solution, RightsWATCH, is now available to be launched as a certified Microsoft Azure Marketplace Offering. Through the Microsoft Azure Bring Your Own License (BYOL) offering, RightsWATCH is […]

Back to the Future Day – If you See Marty McFly …

Back to the Future Day

It’s finally here – the day that Marty McFly and Doc Brown will arrive in their time travelling DeLorean. Wearable technology, multi-channel television and the odd 1980’s Apple Macintosh in an antique shop will all come as no surprise. They might be a little disappointed, however, to discover that the future they have arrived in […]

Runtime Application Dependency Mapping; New Microsoft Application Monitoring

Runtime Application Dependency Mapping

Applications Manager Visualises Application Interdependencies in Complex Environments; Adds Support for Lync 2013, BizTalk, Dynamics CRM Expedites application troubleshooting by pinpointing associated components Quickly estimates the service impact of downtimes or failures Download Applications Manager 12.4  ManageEngine, the real-time IT management company, announced the availability of runtime application discovery and dependency mapping in Applications Manager, its […]

When a Bot isn’t a Bot

Threat modeling is vital to any security practice. For example, we can understand the OWASP top 10 vulnerabilities, but we can easily misspend our efforts and dollars defending against exploits of vulnerabilities not present in our web applications. Managing the epidemic of bot traffic can be just as daunting, when considering how such traffic affects […]