Is your Mobile Device Contaminating your Food?

I was in a restroom the other day and I noticed a food service worker exiting a stall with his cell phone in his hand. My apologies if you are reading this at breakfast. The food service worker placed the phone in his pocket, and diligently washed his hands before returning to work. What is […]

New Wave of Attacks against Ukrainian Power Industry

New Wave of Attacks against Ukrainian Power Industry

The cyberattacks against the Ukrainian electric power industry continue. Background information on this story can be found in our recent publications: BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry BlackEnergy and the Ukrainian power outage: What we really know [su_note note_color=”#ffffcc” text_color=”#00000″]Robert […]

Five Steps to Securing Data Workflows in Your Organization

Five Steps to Securing Data Workflows in Your Organization

Every organization has data flowing into and out of the organization. Along with any data comes the risk of malware. To protect against threats, most organizations implement anti-malware solutions at different entry points, such as email, web, and portable media. However instead of tackling each entry point as a separate anti-malware project, organizations should treat […]

Irish National Lottery DDoS Attack

Irish National Lottery DDoS Attack

In response to the news that the Irish National Lottery website and ticket machines were brought down by a DDoS attack, Igal Zeifman, senior digital strategist at Imperva have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Igal Zeifman, Senior Digital Strategist at Imperva : “As a rule, record setting prizes and jackpots result in traffic spikes on lottery sites […]

All Ashore in 2016 As EU’s Rejects Safe Harbor Protocols

All Ashore in 2016 As EU’s Rejects Safe Harbor Protocols

The highest European Union court has declared Safe Harbor invalid. Companies around the world  must undertake an immediate reassessment of IT, data storage and eDiscovery policies At the end of last year, businesses that relied on the Safe Harbor protocol to transfer data method between the EU and the US had to conduct a major […]

The Anatomy of a DDoS Attack

The Anatomy of a DDoS Attack

The DDoS Environment Before we look at how an attack affects you and everyone in your network, here’s a quick primer on what a DDoS attack is. A typical brute force DDoS attack comes from a botnet – an enormous network of malware-infected devices, often numbering in the millions, that cyber criminals use to lock up your […]

Cyber Attackers Successfully Targeting Oil and Gas Industry

Cyber Attackers Successfully Targeting Oil and Gas Industry

Eighty-two percent of oil and gas IT professionals see significant increase in successful cyberattacks Tripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced the results of a study conducted by Dimensional Research on the cybersecurity challenges faced by organizations in the energy sector. Key findings of the study include: […]

NHS-Approved Health Apps Found to be Unsanitary

Late last year the NHS suffered bad press from the discovery of widespread corrupted apps in their now-closed Health app store. However, the technical directors don’t seem to have addressed inherent security flaws, and have recently been found to be approving corrupted apps according to audits carried out by a security provider.According to Norwegian security […]

22,000 USBs Sticks Left in UK Dry Cleaners Each Year

22,000 USBs Sticks Left in UK Dry Cleaners

ESET study reveals that only 53 percent of devices get returned to owners, which begs the question – what happens to the other 10,004? A new study from internet security firm ESET has revealed that memory sticks, mobiles phones and dead rats are just some of the items dry cleaners find in dirty clothes each […]