“BYOD” Devices Could Create Data Security Risks for Enterprises

Create Data Security Risks for Enterprises

Flexera Software report reveals that popular shopping apps, including Amazon, Disney Store and eBay can access iOS devices’ contacts, calendar, location and social networking apps Flexera Software, the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises, released a new enterprise Application Readiness report detailing potential risks to […]

CyberSecurity Predictions for 2016

cybersecurity predictions

With 2016 right around the corner, there are few cybersecurity predictions. Richard Greene, CEO, Seculert on 2016 security trends : Prediction will emerge as the new holy grail of security. Up until 2014, the cybersecurity industry considered prevention to be their sole objective. Sophisticated enterprises then began to complement their prevention strategies with detection technologies to […]

Festive Parcel Confirmations Being Hijacked by Scammers

Festive Parcel Confirmations Being Hijacked by Scammers

PhishMe Warns of Fake Delivery Scams Currently Circulating PhishMe Inc., the leading provider of phishing threat management solutions, today warned UK consumers to be wary of fake delivery notifications arriving into email inboxes. Fuelled by Black Friday, Cyber Monday and Manic Monday, online spending in the UK has seen unprecedented highs and that’s what scammers […]

5 Cyber Security Predictions for 2016

5 Cyber Security Predictions for 2016

Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise since 2002. Security vendors are challenged at the end of each calendar year to come up with predictions for the year ahead. With the wealth of information, we’ve collected from our products when combined with […]

US Power Grid Vulnerable to Foreign Hackers

Power Grid Vulnerable to Foreign Hackers

It is being reported that a security researcher looking into the breach of California University Housing Files, discovered Cyberattackers had opened a pathway into the networks running the United States power grid. Security experts from Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire : […]

Hackers Break into Businesses’ Websites and Apps

Vulnerable web application is just one of the great gifts left for hackers, as it significantly reduces their time, cost and efforts to get into corporate network. So why do companies fail to secure their web apps? There are many ways hackers can get at your Web site and data, but in many of the […]

Hello Kitty Database Leaked

Hello Kitty Database Leaked

A database for sanriotown.com, the official online community for Hello Kitty and other Sanrio characters, has been discovered online by researcher Chris Vickery. The database houses 3.3 million accounts and has ties to a number of other Hello Kitty portals. Security experts from MIRACL, Tripwire, Lieberman Software and ESET, discuss the issue. [su_note note_color=”#ffffcc” text_color=”#00000″]Brian […]

Social Networking Sites Now Relying on Two-factor Authentication

Social Networking Sites Now Relying on Two-factor Authentication

Calls for Instagram to add extra layer of security In a step to better protect users and reduce fears related to online privacy, two-factor authentication (2FA) has now been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice. Public pressure has been a […]

Whatsapp Failed to Comply with Legal Demands

Whatsapp Failed to Comply with Legal Demands

As you may have heard, Brazil announced it would block Whatsapp after it failed to comply with legal demands, only for a judge to overturn the decision hours later. Dr Nithin Thomas, Co-Founder and CEO of security start up SQR Systems, comment that how tech companies must manage the balance between security and compliance with […]

Next Generation Whitelist App

Next Generation Whitelist App

New app for Tripwire Enterprise improves security, automates compliance and audit documentation for all regulated industries Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, announced the new Whitelist Profiler app for Tripwire® Enterprise. The new app provides audit-ready documentation for all major compliance requirements by providing continuous analysis of essential […]