Hackers Attack Water Systems

Hackers were able to infiltrate an ICS/SCADA system at a water treatment plant and altered crucial settings that controlled the amount of chemicals used to treat tap water according to Verizon’s 2016 Data breach Digest.  Along with outdated computers, the system was exposed to the Internet because traffic was routed through a Web server where […]

Unusual Data-Stealing Malware

USB Thief, a new threat to data, is capable of stealthy attacks against air-gapped systems and also well protected against detection and reverse-engineering. ESET researchers have discovered a new data-stealing Trojan malware, detected by ESET as Win32/PSW.Stealer.NAI and dubbed USB Thief. This malware exclusively uses USB devices for propagation, without leaving any evidence on the compromised […]

Expert Comments on Google List of Untrust Certificate Authorities

Following the news that Google has published a list of certificate authorities that it doesn’t trust, Brian Spector, CEO at MIRACL, comments: “The fact that Google needs to keep a log of all the dodgy certificates out there shows just how prevalent this problem really is.  As we have seen time and time again, any […]

Mobility is at the Heart of Customer Experience

Enterprise-Mobility

Over the last decade we’ve seen a significant increase in mobile technology and it is now becoming the heart of customer experience; forcing retailers to figure out how the digital and physical relationships can work together. Retailers must now decide whether to equip their personnel with mobile devices, introduce more self-service kiosks or expand mobile […]

Will Your Home-Workers be the Cause of Your Company’s Next Data Breach?

data breaches

Every day, across the UK around 1.5 million professionals work from home; more productive, happier in their role and measurably less stressed, perhaps. At the same time, however, they may be increasing the risk to your sensitive business data. Since the Government has recently given all employees the right to request flexible working, the number […]

Experts Comments on PowerWare Ransomware Targeting Healthcare

A new ransomware program written in Windows PowerShell is being used in attacks against enterprises, including health care organizations, Network World is reporting today. The new ransomware program, dubbed PowerWare, is being distributed to victims via phishing emails containing Word documents with malicious macros, an increasingly common attack technique. The Phishing attack is described as being disguised […]

Passwords Are Failing IT Security

New Lieberman Software Poll Reveals Overwhelming Negative Attitude Toward Effectiveness of Passwords Passwords are a cornerstone method for securing access to data. However, a new survey published by cyber security vendor Lieberman Software Corporation revealed that over three-quarters (77%) of IT professionals believe passwords are failing IT security. The study, carried out at RSA Conference […]