Galaxy Note 7 To Include Iris Scanner

Following the news that the Samsung Galaxy Note 7 will be launched with an integrated iris scanner which is claimed to be a “step forward in biometric security” and positioned as a replacement of passwords altogether, Charles Read, Regional Director of UK, Ireland and Benelux at, provider of IAM solutions, OneLogin commented below. Charles Read, Regional […]

HTTP/2: Imperva Hacker Intelligence Initiative Report Reveals Four High-Profile Flaws In The Latest Version Of The Worldwide Web’s Underlying Protocol

LAS VEGAS, Nevada.  Imperva, Inc. (NYSE: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today released its new Hacker Intelligence Initiative (HII) Report: “HTTP/2: In-depth analysis of the top four flaws of the next generation web protocol” at Black Hat USA 2016. In the report, researchers at the Imperva Defense Center  document […]

Is Your Session Border Controller Providing A False Sense Of Security?

Organisations have latched on to the need to secure SIP trunking solutions by implementing a Session Border Controller (SBC). The problem is that the vast majority of SBCs are considered not just one- off investments but also one-off deployments. Yet from denial of service attacks to toll fraud, SIP trunking is not only inherently vulnerable […]

Bitcoin Breach Worth $65 Million

Bitcoin plunging in value because hackers stole about $65 million of the digital currency,Jon Geater, Chief Technology Officer at hales e-Security commented below. Jon Geater, Chief Technology Officer at Thales e-Security: We as an industry are working to develop blockchain, a key underlying technology on which bitcoin runs, in order to take advantage of the exciting […]

Web Hosting Firm 123-Reg Suffers “huge” 30Gbps DDoS Attack

Web hosting provider 123-reg was hit by a +30Gbps DDoS attack between 10.10am and 10.40am this morning. The servers managed to stay online thanks to the company’s DDoS protection platform, however critical applications such as email, control panels and websites (including 123-reg’s own website) were down for a large number of customers. Wieland Alge, VP and GM EMEA at […]

Apple vs. The FBI: What You Need To Know

The legal battle between Apple and the FBI is several months in the rearview mirror, but the continuing battle for technology and privacy is still ahead of us. The long fight between the world’s largest technology company and the most powerful law enforcement agency left us with more questions than answers. Even though Apple may […]

New Malware Hijacks Office Equipment To Create Spying Devices

Following the news that new malware, Funtenna, hijacks office equipment to create spying devices, Tim Erlin, Director, Security and IT Risk Strategist at Tripwire commented below. Tim Erlin, Director, Security and IT Risk Strategist at Tripwire: “While the end result is quite sophisticated, it’s important for organizations to remember that the compromise itself requires that malware […]

Data Of 200 Million Yahoo Users For Sale On The Dark Web

Reports are circulating about a huge data leak of 200 million Yahoo users. This data is being offered for sale on TheRealDeal dark web market by “peace_of_mind” (aka Peace). The batch of data is, apparently, being sold for 3 Bitcoins and contains usernames, passwords and dates of birth. For users based in the United States, the dump also […]

Check Point Introduces First Real-Time Zero Day Protection For Web Browsers

New SandBlast Agent for Browsers plug-in prevents the latest web-based malware, phishing and credential theft attacks using cloud-based analysis  Check Point has announced SandBlast Agent for Browsers, an anti-malware and anti-phishing extension for web browsers to address the rapid growth in web-based malware and social engineering attacks.  The solution protects users against malicious files and content downloaded from […]

5 Great Reasons To Improve Your Security Technical Skills

When IT leaders talk about their employees improving their skills, these days much of the conversation revolves around soft skills. The ability to communicate technical information to a non-technical audience, for example, is important as IT becomes more integrated with overall business functions and innovation within the organization. Leadership, interpersonal skills, project management skills, and […]