Understanding How IDaaS Can Securely Accelerate Cloud Adoption

DLP Frameworks to the Cloud With New Reference Architecture

Companies today are feeling the pressure to make it easier for end users to get access to a rapidly growing number of SaaS applications. Couple that with the emergence of bring your own device (BYOD) and shadow IT/bring your own app (BYOA) on the end user side, and you can see how the challenge of […]

18 UK Banks Targeted By Updated Version Of Qadars Trojan

IBM X-Force Research reported that the operators of the Qadars Trojan have been progressively updating the malware’s defenses and tailoring its configurations to target 18 banks in the U.K. Mark James, Security Specialist at ESET commented below. Mark James, Security Specialist at ESET: “As the UK has a very strong economic state with some very good established […]

Three Reasons To Consider Managed Security Services

Deliver on speed to value If you ask an information security professional if cyber attackers are smarter than they are – the answer is no.  But if you ask the question about if they can they move faster – the answer is absolutely yes.  When an organisation needs to improve its security posture with a […]

880,000 Users Exposed In MoDaCo Data Breach

Subscribers of UK-based MoDaCo, a forum specialising in smartphone news and reviews, have been unpleasantly surprised by notifications that the site and their account have been compromised. IT security experts from AlienVault and ESET commented below. Javvad Malik, Security Advocate at AlienVault: “This unfortunately highlights how poor the threat detection and breach monitoring capabilities of most companies […]

Disposing Of IT Assets: How Not To Have Your Information Stolen On eBay

Some organisations dispose of their IT assets by recycling what they can and discarding the rest. For others, the process involves reselling parts that still hold some market value. And although today’s IT disposition industry claims to have a strong focus on compliance, governance and security, there are still several accounts of sensitive business or […]

Torrenting: Know What Risks You Take

Increased Business Risks

Torrenting is the act of downloading many small bits of files at the same time from different sources – it’s essentially crowd sourcing for media content. While it can seem safe under the camouflage of the enormous World Wide Web, torrenting files can be a risky endeavour and could end up getting you into trouble […]

Hijack Of Tesla Model S While In Motion

Chinese researchers have been able to hack into the Tesla Model S while it is in motion up to 12 miles away. These researchers have withheld details of the a zero day attack and privately disclosed the flaws to Tesla. IT security experts commented below. Craig Young, Cybersecurity Researcher at Tripwire: “At first glance, it would […]

Only 29% Of Merchants Can Accept Chip Cards, CNP Fraud Surging Anyway


Nearly a year after the EMV liability shift in the U.S.—a move specifically engineered to incent retailers to install EMV-compliant POS systems in their stores—only 44% of merchants are equipped with the new terminals, according to a new report from The Strawhecker Group. Furthermore, not all of those merchants that have installed EMV-enabled systems are using […]