Sanctioned Cloud Apps Laced with Malware

Sanctioned Cloud Apps Laced with Malware

Cloud fan-out effect shows attackers use sync and share to propagate threats Netskope, the leading cloud access security broker, today announced the release of the February 2016 Netskope Cloud Report™ on enterprise cloud app usage and trends. According to the report, the fourth quarter of 2015 saw the highest number of cloud apps in use […]

A Mobile Trojan invading Android’s Brains

A Mobile Trojan invading Android’s Brains

Kaspersky Lab experts have detected Triada, a new Trojan targeting Android devices that can be compared to Window-based malware in terms of its complexity. It is stealthy, modular, persistent and written by very professional cybercriminals. Devices running the 4.4.4. and earlier versions of the Android OS are at the greatest risk. According to the recent […]

Weak Bank Password Policies leave 350 Million Vulnerable

Weak Bank Password Policies leave 350 Million Vulnerable

In a study that looked at the password strength required to access website account for Wells Fargo, Capital One and 15 other banks, researchers found that 35 percent had significant weaknesses in their password policies, according to University of New Haven Cyber Forensic Research and Education Group. The crux of UNH’s finding center around the […]

Hack the Pentagon Project

Monzy Merza, chief security evangelist and director of cyber research at Splunk on the Hack the Pentagon project, which invites experts to hack into Pentagon systems to test its security defenses. [su_note note_color=”#ffffcc” text_color=”#00000″]Monzy Merza, Chief security Evangelist and Director of CyberResearch at Splunk: “The DoD already has mature red teams and offensive cyber capabilities. Bug […]

APT Targeting Indian Diplomatic and Military Resources

APT Targeting Indian Diplomatic and Military Resources

Proofpoint discuss their recent discovery of a new Advanced Persistent Threat (APT) which is targeting Indian diplomatic and military resources. What initially appeared to be a relatively small email campaign sent to Indian embassies in Saudi Arabia and Kazakstan now appears connected to watering hole sites targeting Indian military personnel as well as other campaigns […]

Cybersecurity Risk Becoming a Mainstay in Annual Audit Plans

Cybersecurity Risk Becoming a Mainstay in Annual Audit Plans

Tenth annual survey also explores evolution of internal auditing over the past decade According to Arriving at Internal Audit’s Tipping Point Amid Business Transformation, the 2016 Internal Audit Capabilities and Needs Survey report released by global consulting firm Protiviti, organisations are more likely than ever to evaluate cybersecurity risk as part of their annual audit […]

Natwest Bank Accounts Raided through Stolen Phones

Natwest Bank Accounts Raided through Stolen Phones

Cybercriminals have been able to snatch thousands of pounds from Natwest bank accounts using stolen mobile phones. Natwest has admitted that a serious flaw in its online banking system has allowed criminals to raid accounts. Security experts from Tripwire, ESET and Proofpoint provide advice for users. [su_note note_color=”#ffffcc” text_color=”#00000″]Lamar Bailey, Sr. Director, Security R&D at […]