Malware Becomes Darknet Cottage Industry

Malware Becomes Darknet Cottage Industry

InfoArmor is reporting that hackers are selling digital certificates that allow code signing of malicious instructions and making a whole business out of it. Travis Smith, senior security research engineer for Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Travis Smith, Senior Security Research Engineer for Tripwire : “Code signing provides the assurance to users […]

A New Version of the Chimera Ransomware

Chimera Ransomware

Security researchers from Botfrei have published findings of a new version of the Chimera Ransomware that is currently targeting German SMBs. According to their report, and in a twist to previous ransomware campaigns, Chimera warns those unlucky to encrypt their files that, if they don’t pay, their data will be published online. Troy Gill, manager […]

Global DDoS Threat Landscape Report

Distributed denial of service (DDoS) attacks are a constantly evolving menace that threaten online businesses with downed websites, financial losses and damaged client relationships. As perpetrators continue to adopt new technologies and methods to execute attacks, the need for organizations to stay informed and up-to-date with the latest trends in online security has never been […]

Protect your E-Signatures and E-Signed Documents from a Data Breach

Protect your E-Signatures

In celebration of October’s designation as National Cyber Security Awareness Month, we are taking a closer look into the security of electronic signatures. To understand how connected we all are to our technology, we can simply look at how we spend the first few minutes of the day. A study from IDC Research found that […]

The New Investigatory Powers Bill

The New Investigatory Powers Bill

With the announcement of the details of the new Investigatory Powers Bill, Security experts from Pryvate and techUK have the following comments on this critical topic. [su_note note_color=”#ffffcc” text_color=”#00000″]Antony Walker, Deputy CEO of techUK : “This draft bill requires very careful scrutiny. On first impressions it looks like a step in the right direction to creating what is required […]

There may be Worms in your Apple

Worms in your Apple

An MS-ISAC Cyber Security Advisory issued on September 18 states that multiple vulnerabilities in Apple products could allow remote code execution: “Multiple vulnerabilities have been discovered in Apple iOS and iTunes…These vulnerabilities can be exploited if a user visits or is redirected to a specially crafted webpage or opens a specially crafted file, including an […]