IT Security Conference & Exhibition

IT Security Conference & Exhibition

ENITSE Enterprise IT Security Conference & Exhibition will be held on 17-18 May 2016 in Istanbul, Turkey. ENITSE is one of the most important events in EMEA in its category. An intensive participation is expected to the ENITSE 2016 Conference and Exhibition from Turkey and many other countries of the world. The Agenda (Conference Program) […]

Private Key for Xbox Live Leaks

xbox leak

Microsoft has updated their Certificate Trust List (CTL) after the private key for xboxlive.com was leaked to the Web. The company didn’t explain how the leak happened, but the exposed certificates were immediately revoked and replaced. http://www.pcworld.com/article/3013113/security/microsoft-updates-trust-list-after-private-key-for-xbox-live-leaks.html Patrick Hilt, CTO of MIRACL explains why this is still an issue despite Microsoft revoking the exposed certificates: “This […]

An AV Vulnerability that Bypasses Windows

AV Vulnerability that Bypasses Windows

Our research team exposed a critical security vulnerability appearing in various Anti-Virus (AV) products which has the potential to turn the Anti-Virus to an attack-enabler tool. This issue is not necessarily constrained to security solutions, but potentially to any intrusive application such as data leak prevention (DLP) and performance monitoring solutions. Due to the pervasiveness […]

Extort Money from the International Community

Extort Money from the International Community

The ongoing war in Syria has seen the number of fraudulent emails targeting the international community rise in recent months, according to a Kaspersky Lab report into spam and phishing trends. Widespread media coverage has increased international interest in the plight of Syrian citizens, and this has led Nigerian scammers to jump on the bandwagon […]

Ethical Hackers – What they do and Why

Ethical Hackers

The recent high profile cyber attack at Talk Talk highlights how breaches are becoming a fact of life for any organisation using the web for business. It’s the reason why many companies employ ethical hackers to test their cyber security and identify potential vulnerabilities that put confidential financial, security or customer data at risk. So, […]

A True Remote Code Execution Bug

A True Remote Code Execution Bug

One of the most serious patches is one for a true remote code execution bug within the DNS implementation. Identified as MS15-127, Microsoft indicates that a crafted DNS request can trigger an exploitable use-after-free condition to achieve code execution in the context of the local system account. Although Microsoft has indicated that we are not […]

The Insecurities of Public Wi-Fi

The Insecurities of Public Wi-Fi

It’s no surprise to anyone that Wi-Fi use continues to grow. However, what is hard to believe is that there are so few public Wi-Fi networks capable of serving our needs outside of the home securely—particularly when you consider that as of today, nearly everyone owns a smart phone, 91% use a laptop, and 80% have a […]

Challenges of IoT in the Workplace

The Internet of Things (IoT) has been the subject of industry analyst, and tech-media, excitement for just about forever. From an IT security perspective, cyber-criminals must be rubbing their hands together in excitement when they read that the US Federal Trade Commission estimates there now to be twenty-five billion devices online, with separate HP research […]

Maintenance to Optimize your Tech Devices

Maintenance to Optimize your Tech Devices

Whether you’re the kind of guy who expertly navigates between his tablet, Apple Watch and computer throughout the day, or the kind of gal who simply manages everything from her smartphone, technology is a significant part of your life. And when you put your money toward buying new devices or upgrading ones you already own, […]

What 2016 Holds for Businesses from a Software Management Standpoint

Flexera Software

Software Asset Management Critical to Cybersecurity Initiatives and Automation to Managing Agile Development Cycles in 2016 Vincent Smyth, General Manager & Senior VP EMEA for Flexera Software, offers his insights into what 2016 holds for businesses as they grapple with more complexity in maintaining and securing their software estate. Windows 10 – Agile Dev Will […]