The Many Evolutions Of Locky

Throughout the year, Forcepoint’s researchers been monitoring key milestones in Locky’s evolution; from its birth in February and the addition of virtual machine (VM) and analysis tool countermeasures in June, to its use of off line encryption in July and an intermediate downloader in September. Locky is distributed through exploit kits on infected websites and emails via infected MS Office and […]

Shortage Of Security Staff Over Christmas Highlighted, As 59% Of Consumers Fear Cyber-Attacks Disrupting Celebrations, Warns Huntsman Security

Consumers growing less forgiving: only 4% would unconditionally stay with a business that failed to inform them of a cyber-attack  LONDON.  59 percent of consumers fear that businesses operating with skeleton crews over the Christmas holidays will leave them vulnerable to the effects of cyber-attacks, cybersecurity specialist Huntsman Security has warned. In a TNS survey […]

Lieberman Software Integrates With Lynx Risk Managerò To Extend Continuous Risk And Compliance Management

State of Privileged Accounts and Password Policy is Immediately Reflected in Customer’s Risk and Compliance Profile London, UK.  Today announced an integration with Lynx Technology Partners’ GRC platform. Lynx Risk Manager (LRM) can now import privileged account information from Lieberman Software’s Privileged Identity Management platform, Enterprise Random Password Manager™ (ERPM), and immediately update security control scores in LRM.  […]

Why All Eyes Should Be On IT Security For The Incoming U.S. CTO

In the presidential election, cyber security was a major issue as hacked emails reveal a host of political embarrassments and add fuel to the unprecedented political discourse in this country. One person who will inherit this issue on day one of his or her new job is the incoming United States Chief Technology Officer, who […]

‘Tis The Season For Cybersecurity Predictions: Tufin Weighs In

Reuven Harrison, CTO and Co-founder of Tufin, a provider of network security policy orchestration solutions for enterprise cybersecurity, has a few predictions up his sleeve. Here are his thoughts on what 2017 might look like in the cybersecurity space: Security skills gap approaching Grand Canyon levels Increasing complexity has made protecting the enterprise network more difficult […]

Local Authorities Are Understaffed And Putting Information At Risk

Local authorities face the challenging task of managing ever-growing volumes of records, covering anything from council taxes to confidential information about local schools. Furthermore, they must manage this data securely while dealing with the pressures of cutting costs and improving the overall efficiency of the services they provide to the public. If the protection of […]

2017 Trends: Cybersecurity For Digital Broadcasters

As we move into 2017, Steve Miller Jones, Senior Director of Product Management at Limelight Networks commented below about how important cybersecurity will be to digital broadcasters. Steve Miller Jones, Senior Director of Product Management at Limelight Networks: “ 2017 is going to be critical transition year to how digital content is secured online.The SSL encryption […]

Hacktivists Vs Faketivists: Fancy Bears In Disguise

What is a faketivist? Faketivist /fāktəvəst/ Noun A fictitious persona created to emulate a hacktivist and act as a public-facing mouthpiece to provide plausible deniability for and/or leak the information gleaned from advanced persistent threat (APT) operations. One of the more surprising stories of 2016 was the Russian effort to shape the outcome of the […]

Super Mario Run Security Issues

Following the launch of Nintendo’s Super Mario Run game, Aaron Lint, VP of Research at Arxan Technologies, commented below on the security issues surrounding the app and its use of online DRM (digital rights management), alongside advice on the most effective way to secure mobile gaming applications. Aaron Lint, VP of Research at Arxan Technologies: […]