Malware Disguised as WhatsApp Update

Malware Disguised as WhatsApp Update

The Association of Banks in Singapore is warning of a new malware disguises itself as a WhatsApp update to illegally access mobile banking apps. Craig Young, security researcher at Tripwire have following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Craig Young, Security Researcher at Tripwire : “This is essentially an advanced phishing attack using social engineering to convince […]

British Pub Chain has Suffered a Data Breach

British Pub Chain has Suffered a Data Breach

Popular pub chain Wetherspoons has suffered a data breach. Cyber criminals have stolen sensitive data such as credit and debit card data from customers who bought vouchers from the JD Wetherspoon site. Security experts from Tripwire, ESET and Lieberman Software have the following comments on this breach. [su_note note_color=”#ffffcc” text_color=”#00000″]Jonathan Sander, VP of Product Strategy at […]

69% of Users Would Bypass Security Controls to Win Business

Bypass Security Controls to Win Business

Although 71% of respondents think that security should be equally, or even more important than business flexibility, users just find backdoors to do their job Balabit, a leading provider of contextual security technologies, today unveiled the results of its pan-European survey into the current state of IT security. The survey looked at how organizations balance IT […]

Data Archiving has Taken on a New Role

Data Archiving has Taken on a New Role

In the past, the main drivers for data archiving centred on legal and compliance initiatives and business continuity, including eDiscovery, records retention, audits and disaster recovery. But as more companies are looking to take advantage of information in an effort to gain competitive advantage in their markets, data archiving has taken on a new role. […]

UK’s Top Teenage Code Breakers Battle it out in Cyber City Games

Cyber City Games

UK’s top seven school code breaking teams fight to become UK cyber champions Futuristic ‘Cyber City’ themed competitions will challenge contestants to infiltrate networks, stop criminals from causing damage to infrastructure, learn how to gather intelligence and find criminals Cyber-battles designed by leading industry employers including National Grid, BT, Airbus Group, Raytheon, GCHQ, the National […]

How Destover Evades Detection

Damballa discovers new toolset linked to Destover Attacker’s arsenal helps them to broaden attack surface Destover is best known as the malware used in the attack on Sony Pictures Entertainment in November 2014, and also for its relationship based on its wiping technique with the Shamoon malware used in the attack on Saudi Aramco in 2012. […]