Charging Mobile Devices Could Put Data at Risk


Smartphones can be compromised when charged using a standard USB connection connected to a computer, Kaspersky Lab experts have discovered in a proof-of-concept experiment. The researchers are now evaluating what the impact of such an incident might be. Have you ever wondered how safe your smartphone and data are when you connect the device to […]

Another Wave of Malware Hits Europe, Mainly Downloading ‘Locky’ Ransomware, Ireland Affected


ESET finds Ireland among the top countries affected by new Danger.Script malware. ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries. The most notable detection ratios are seen in Luxembourg (67%), Czech Republic (60%), Austria (57%), Netherlands (54%) and the United Kingdom (51%), but Ireland follows closely with […]

Company Fires CEO After Falling Victim to $56-Million Online Scam

FACC, an Austrian-based manufacturer of airplane parts, has fired its CEO, Walter Stephan, after he fell victim to an email scam that defrauded the company of €52.8 million ($56.79 million). Ryan Kalember, senior vice president of cybersecurity strategy for Proofpoint commented below. Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint comments: Business email […]

High-Tech Bridge Uncovers Large Number of Fraudulent Cybersecurity Company Domains

Research into the proliferation of fraudulent domains affecting the cybersecurity industry by web security experts High-Tech Bridge has uncovered some startling results, with a string of household names being impersonated online. High-Tech Bridge researchers have analyzed domains of the leading cybersecurity companies from the NASDAQ’s NQCYBRindex, as well as few private but well-known cybersecurity companies, […]

Top 10 Tips for a Lean ISO 27001 Implementation

Are you contemplating ISO 27001 implementation but concerned about the time and management resources that will be needed? Many modern businesses operate in a lean and agile way and this is often seen as contradictory to the traditionally bureaucratic processes associated with ISO 27001. Some even believe it may restrict the way they run their […]

How the EU-US Privacy Shield Can Benefit Your Business


When Europe’s highest court declared the Safe Harbor agreement invalid in October 2015, you could almost hear the collective gasp from U.S. companies conducting business in the European Union. U.S. businesses have enjoyed nearly unfettered access to international consumers’ data for almost two decades, and the October ruling most certainly threw a wrench in that […]

All Seeing All Knowing Border Control

Necessity is the mother of invention, and with new breaches reported on a near-daily basis, the evolutionary arms race between hackers and cyber-defenders has led to the rapid disruption of the traditional managed security service provider (MSSP) market. As vendors scramble to stay relevant, this has led to a sea of sales messages and acronyms […]

Ransomware criminals should be “shot at sunrise”

Should be “Shot at sunrise” is the opinion of U.S. politician Michael C.Burgess, the representative for Texas, when talking about the cybercriminals who distribute ransomware that victimizes consumers and businesses. Ransomware, malicious software designed to block access to a computer system until a sum of money is paid, and the use of exploit kits to […]

Context is Key to Identity and Access Management When Securing a Mobile Workforce

As the workforce becomes more mobile and more critical enterprise applications are hosted in the cloud, identity and access management (IAM) grows increasingly important to help assure secure remote access to organizations’ web applications and data. When employees move around from network to network and repeatedly swap devices, their risk characteristics change. Currently, we take a binary […]

Borderless Cyber Europe 2016 to Emphasize the Importance of Threat Intelligence Sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has been growing since OASIS first launched its Borderless Cyber brand last year in Washington, DC. Dr. Robert W. Griffin, chief security architect at RSA, isn’t surprised. For him, such anticipation […]