Vulnerable Smart Home IoT Sockets Act As Bridge To Take Down Full Networks

Researchers have discovered critical security flaws in connected smart plugs which can give attackers access to a full home network — as well as your email account. Craig Young, Security Researcher at Tripwire commented below. Craig Young, Security Researcher at Tripwire: “This is entirely unsurprising to anyone who’s been paying attention to the IoT market.  […]

Eddie Bauer Retail Stores Hit By POS Breach – Expert Comments

Clothing store chain Eddie Bauer said it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at those stores during the first six months of 2016 may have been compromised in the breach. IT security experts from ESET, Tripwire and […]

Fringe Defence: Identifying Devices And Protecting Your Business From Cyber Attacks

With the rise of the Internet of Things, businesses are now exposed more than ever before to the threats of cyber attacks and online fraud.  How can you ensure you minimise the risks posed by unsolicited fringe devices and keep your company protected? Jason Fry, a cybersecurity specialist and Managing Director at PAV i.t. services, investigates. […]

Managing Application Connectivity Securely Through A Merger Or Acquisition

For many businesses a merger or acquisition is highly charged. There’s often excitement about new beginnings mixed with angst that comes with any major business change – not least when it comes to IT security. During a merger and acquisition, you have two enterprises each running complex IT infrastructures with hundreds if not thousands of […]

Developing Immunity Against Zero-Day Mutations

Scott Register at Ixia looks at how the latest malware can be mutated to evade detection by conventional defences, and how businesses can counter the threat. Everything has to change and adapt to its environment in order to survive, whether it’s a plant, animal, or malicious code developed by cybercriminals.  As new attack techniques are […]

65% Of IT leaders Expect A Serious Data Breach To Hit Their Business In The Next Year

According to a survey report issued by Okta, 65% of respondents think that a data breach will happen within the next 12 months if they do not upgrade legacy security solutions in time. NSFOCUS, FireMon and Lastline commented below. Richard Meeus, VP Technology EMEA at NSFOCUS IB: “Attacks will happen. It is no longer a case of if, but, when. Whether […]

The Top 14 Cyber Aware Countries

Are you confident with your country’s cyber security? According to a recent study, geographic location is crucial to ensure data security. Apart from the country’s technological capacity, there are other things that must be promoted by the government, including pertinent legislation, and capacity building, to promote cyber security awareness. These are the factors that play […]

Expert Comments on POS Malware Infected All Eddie Bauer Stores In USA And Canada

Clothing store chain Eddie Bauer said it has detected and removed malicious software from point-of-sale systems at all of its 350+ stores in North America, and that credit and debit cards used at those stores during the first six months of January may have been compromised in the breach. George Rice, senior director, payments at HPE Security – […]

Pokemon Go Players Targeted With SMS Phishing Scam

Hackers have been targeting Pokemon Go players via SMS, prompting them to click on a link to gain access to thousands of Pokecoins and in-game currency, in exchange for points. However, the link would instead lead players to a phishing site called Pokemonpromo.xxx. Dwayne Melancon, CTO and VP, Research and Development at Tripwire commented below. […]