IoT Malware Competing With Mirai

Mirai—a notorious malware that’s been enslaving IoT devices—has competition. A rival piece of programming has been infecting some of the same easy-to-hack internet-of-things (IoT) products, with a resiliency that surpasses Mirai, according to security researchers. Itsik Mantin, Director of Security Research at Imperva commented below. Itsik Mantin, Director of Security Research at Imperva:  “This is another […]

Design With Usability In Mind

How do you make 2FA more user-friendly? Isaac: To keep up in today’s competitive consumer technology market, perfecting the user experience is a must. This makes it hard for brands to add extra security measures that can potentially disrupt the user experience. We consistently see brands sacrifice security for an optimal user experience, adopting the […]

Firefox, And Opera Vulnerable To Undetectable Phishing Attack

Uncovers Credential-Grabbing Phishing Campaign

Browsers such as Chrome, Firefox, and Opera are vulnerable to a new variation of an older attack that allows phishers to register and pass fake domains as the websites of legitimate services, such as Apple, Google, eBay, and others. Itsik Mantin, Director of Security Research at Imperva commented below. Itsik Mantin, Director of Security Research at […]

1 In 5 Businesses Hacked

The British Chambers of Commerce (BCC) announced that ‘One in five’ British businesses had been hacked by cyber criminals over the past year, according to their latest survey. IT security experts from FireMon and Veracode commented below. Paul Calatayud, Chief Technology Officer at FireMon: “When reflecting on the statistic that one of five British business have […]

New Ransomware Discovered

A new ransomware has been discovered by security researchers at Recorded Future. Named ‘Karmen’, the ransomware allows anyone, including novices, to set up an account and customise their own ransomware campaign. The Karmen costs $175 and lets buyers set ransom prices, determine how long to give victims to pay and offers multiple ways to communicate […]

New Limelight Cloud Security Services Offer Scalable Protection To Safeguard Websites And Apps From Online Attacks

New capabilities help customers reduce the risk of downtime and data theft TEMPE, Ariz – Limelight Networks, Inc. (Nasdaq: LLNW), a global leader in digital content delivery, today introduced Security Alert and WAF Express, two new additions to its Cloud Security Services that enhance protection against attacks on websites and unauthorised access or theft of content. Limelight […]

Employee Training Isn’t An Endpoint Security Panacea

Make no mistake about it: employee behavior is, has been, and will continue to be the greatest vulnerability to a company’s endpoint security. Far, far too often corporate employees are the unwitting allies of malware, ransomware, and other growing digital threats. Many are using devices with highly sensitive data and corporate network access for their […]

NSA-Leaking Shadow Brokers Just Dumped Its Most Damaging Release Yet

it security

The Shadow Brokers—the mysterious person or group that over the past eight months has leaked a gigabyte worth of the National Security Agency’s weaponized software exploits—just published its most significant release yet. Friday’s dump contains potent exploits and hacking tools that target most versions of Microsoft Windows and evidence of sophisticated hacks on the SWIFT banking system […]

Government Cyber Security Breaches Survey 2017

Rapid Automation and Industrialization of Cyber Attacks

The Government has released a survey detailing business action on cyber security and the costs and impacts of cyber breaches and attacks. This comes hot on the heels of yesterday’s report on cyber attacks from the British Chamber of Commerce. IT security experts from Cylance, Imperva, FireMon, Synack, Lastline, Corero Network Security, Tripwire, NuData Security, Digital Guardian and Bitglass commented below. […]