Austrian Hotel Hit By Ransomware – Guests NOT Locked In

Following the news about a luxury lakeside hotel in the Austrian Alps, Romantik Seehotel Jägerwirt, recently paid a large ransom in Bitcoins, after its systems were attacked by a ransomware attack. It was initially reported that the attack had locked hotel guests in their bedrooms until the ransom was paid. However, the owner of the hotel Cristoph […]

Hackers Ransoming CCTV Cameras Before The Inauguration

Before the inauguration in Washington, hackers used ransomware to take down DC police surveillance cameras forcing the police to remove all the software and reinstall it on 123 cameras. While that was an arduous task, no ransom was paid. Tim Erlin, Senior Director of IT Security and Risk Strategy at Tripwire commented below. Tim Erlin, […]

Android Pattern Locks Opened Using Video Recordings

Scientists from China and the UK have published research that reveals how to break Android’s pattern lock system using videos of people entering their patterns. Craig Young, Principal Security Researcher at Tripwire commented below. Craig Young, Principal Security Researcher at Tripwire: “Password based authentication is the best option in terms of securing an Android device. […]

Site That Disclosed Major Security Breaches Shut Down In Raid

According to recent reports online, see one here from the Register, the LeakedSource data breach aggregator and look-up service has been taken offline by what is thought to have been a police raid. The site uncovered a number of high-profile data leaks, including 85.2m records from Dailymotion, 32m Twitter accounts and 43m from Weebly, but […]

New 451 Res./Thales Data Threat Report: Security Spending Priorities Must Change

The new Thales Data Threat Report produced with The 451 Research codifies and questions enterprise security spending priorities.  Among the key points: 26% of organizations responding experienced a breach in the last year and 30% say their organizations are very or extremely vulnerable; and organizations are spending on endpoint & network security. 451 analysts urges organizations to embrace newer security […]

Lessons Learned From Yahoo’s Monumental Breach(es)

Unless you’ve been living under a rock, you’ve heard that Yahoo has been in serious hot water lately. Two isolated breaches, disclosed separately from one another but totaling an impact of almost 1.5 billion users has caused a major blow to the tech giant’s reputation; so much so that Yahoo’s sale to Verizon is now […]

Facebook Gets Physical For Safer Logins

social network to take on Facebook

Facebook has been offering the two factor authentication login option for a while now, and is now trying to make its use easier than ever before. So, instead of entering a confirmation code after entering the password, users can simply tap their physical security key, and they’re in. Aside from making the login process faster […]

Data Protection Day

New cybersecurity tools

If there’s one thing 2016 proved, it’s that cyber threats are constantly and persistently evolving. With ransomware and phishing attacks hitting the news, working to ensure data privacy is more important than ever. Data Privacy Day aims to educate, and bring awareness to the importance of cyber security and data protection. IT security experts from Hyve Managed […]

Top-Level Security Insight: Kaspersky Lab’s Acclaimed Interactive Protection Simulation Training Goes Online

Detection Deficit in Data Security

Kaspersky Lab announces the availability of its Kaspersky Interactive Protection Simulation Online training (KIPS Online). KIPS Online is a valuable addition to previously available and highly regarded KIPS Live offline cybersecurity training. Both Live and Online versions offer actionable security intelligence training for top-level business executives around the world. Not your average monopoly-style game KIPS […]

Firewall Efficacy Increased When Deployed With A Firewall Management Tool, FireMon Study Finds

Host-based or Network-based Firewalls

59% of Organizations That Use Firewall Auditing and Configuration Tools Have Seen Fewer Breaches and 65% Have Increased Productivity LONDON. FireMon, the leader in Network Security Policy Management (NSPM), has released a commissioned study entitled Automate Zero Trust Policy and Enforcement conducted by independent, research-based consultancy, Forrester Consulting. The study illustrates the many benefits of using a […]