The Most Underestimated IT Security Threat For 2017

What is the Most Underestimated IT Security Threat for 2017, and Why? “IoT will become another ‘shadow IT’ headache” IoT and firmware exploits will prove to be highly effective against both consumers and organizations. DDoS attacks such as the Mirai powered attack on Dyn and Krebbs will continue to plague organizations, but the attacks will […]

How To Minimize Insider Threats In Cyber Security

Insider threats and the danger they pose are both extremely publicized and well covered topics. Apart from the famous NSA leak by Edward Snowden, there are also strong rumors that several high profile data breaches and leaks of the past couple of years have involved malicious insiders (Ashley Madison and Mossack Fonseca, to name a […]

New Leet Botnet Launches Huge 650 Gbps DDoS Attacks

In a new blog post, Imperva researchers reveal they mitigated one of the largest DDoS attacks ever seen, which reached a huge 650 Gbps and had absolutely nothing to do with the Mirai malware. As the end of the year approaches, it’s natural to contemplate the future and look for signs of things to come. Sometimes, […]

Avast Unveils Top Ten Apps Draining Your Android Phone

Snapchat, Facebook, musical.ly, and Tinder among top gobblers of battery, storage and data  London, UK. What do Tinder, Snapchat, Spotify, and Wattpad all have in common? Avast, the leader in digital security products for consumers and businesses, found they are all top performance drainers on Android phones when run by users, according to the Avast Android App Performance […]

Preparing For A Year Of Unknown, Unknowns In Cyber Security

Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many believe that this trend starts and ends with a contentious election, it’s not something that’s […]

2017 Data Security Predictions – Alfresco Software

CISOs will shift more investment toward granularly identifying information vs. parametric measures: Depending on your business, digital information on average is doubling every three to nine months. The knee-jerk reaction to burgeoning data is to protect all that ‘stuff’: contain it behind hyper secure firewalls, deploy DLP (data loss prevention/protection) technologies at the parameter and key core […]

Positive Technologies Advises ATM Industry On Serious Vulnerability In Security Software

Zero-Day in Intel Security Solidcore could allow attackers to successfully penetrate banks with customized malware London (UK). Intel Security has given credit to specialists at cyber security company Positive Technologies, for detecting a serious vulnerability in its Solidcore ATM protection product, which is covered in a recent security bulletin. The zero-day vulnerability, CVE-2016-8009, was found during […]

Tumblr Down Due To A Possible DDoS Attack

Tumblr went down for over two hours as a result of a potential large-scale DDoS attack, with users unable to access the blogging site. Stephanie Weagle, VP at Corero Network Security commented below. Stephanie Weagle, VP at Corero Network Security: “Reports of popular blogging site Tumblr being taken offline by way of DDoS attack once again proves […]

Navigating A New Landscape Of Customer Identity Management

GDPR. Four letters, one colossal shift in privacy compliance for companies around the globe.  With organisations collecting increasing amounts of data, customers and the governments that represent them have evolving expectations about the transparency surrounding data collection, and the laws that govern the usage and reporting of it. Only recently, Whatsapp was warned by European […]