Japanese Military Of Defence Target Of Cyberattack

Following the news that Japanese Defence Ministry and Self-Defence Forces were the target of a cyberattack in September this year that may have compromised Japan’s internal military network. It remains unclear if the attack was was by a foreign nation state, or hackers outside state institutions. Mike Ahmadi, Global Director – Critical Security Systems at Synopsys commented […]

German Telekom Investigating-Hackers Suspected As 900,000 Hit By Internet Outage

Following the news that  Hackers suspected as 900,000 hit by internet outage. Update: German Telekom is now looking into evidence of a hacker attack after 900,000 internet, phone and television clients were hit by a massive outage starting on Sunday and going into Monday. IT security experts from Synopsys Software Integrity Group, Rubicon Labs and Positive Technologies commented below. Mike Ahmadi, […]

GNU/Linux As An Alternative To Windows For A Small Business

In the following article, I present a real-world case scenario as an example for setting up a small business with Linux as a desktop solution. It is presented as a single illustration of a unique case, and Linux/open source deployments will of course vary based on the number of users, business need and security requirements. […]

Ransomware Hits San Francisco’s Transport – Passengers Ride For Free

San Francisco’s transport system was hit by a ransomware attack with hacker/hackers demanding a ransom of 100 bitcoins ($70,000, £56,000, €66,000). Following the attack, ticket machines shut down and passengers of the San Francisco Municipal Railway (MUNI) were allowed to ride for free, according to reports. IT security experts from Redscan, AlienVault, ESET, Intercede, Lieberman Software, NSFOCUS and Tripwire […]

ESET Introduces ESET Threat Intelligence, Early Warning Service For Enterprise Customers

Hidden Threats in Encrypted Mission-Critical

Starting today, ESET® will offer ESET Threat Intelligence, a service that predicts and proactively notifies customers of real-time threats targeting their businesses so they can be more flexible when adapting to a rapidly changing threat landscape. Additionally, the service is available for the security teams of Enterprise companies as well as Security Operations Centers to analyze specific malware and […]