Hackers Cybersquat On Hundreds Of UK Bank Domains To Spoof And Exploit Users

DomainTools identifies over 300 websites tricking web users into thinking they’re clicking on to UK high street bank websites London, UK, – DomainTools, the leader in domain name and DNS-based cyber threat intelligence, today released research regarding the plethora of cybersquatters and how they target  popular UK banks. DomainTools found 324 registered domains using the trademarked […]

Managing Complexity Is No. 1 Security Challenge In FireMon’s Third Annual State Of The Firewall Report

Global benchmarking study gives visibility into the security infrastructures of more than 400 organizations to find current and future trends for firewalls and emerging networking technologies OVERLAND PARK, KS & DALLAS, TX – FireMon, the leader in Intelligent Security Management,  today released its 3rd Annual State of the Firewall Report that surveyed more than 400 organizations about […]

Google Victim Of Phishing Attack

Following the news about the Google phishing attack, IT security experts from McAfee and Plixer International commented below. Raj Samani, Chief Scientist at McAfee: “Phishing attacks remain the most common method of manipulating individuals into clicking on links and ultimately installing malicious content onto their systems. Taking advantage of trusted, well-known brands attempts to leverage the use of authority, resulting […]

Cyberattack Hits 26,000 Debenhams Flowers Customers

A cyberattack has compromised the personal data of up to 26,000 Debenhams customers. The breach, which is understood to have been malware-based, targeted the online portal for the retailer’s florist arm, Debenhams Flowers. Javvad Malik, Security Advocate at AlienVault  commented below. Javvad Malik, Security Advocate at AlienVault: “This attack re-enforces the fact that attackers are increasingly targeting […]

Hundreds Of Privacy-Invading Apps Are Using Ultrasonic Sounds To Track You

A new privacy-busting technique that tracks consumers through the use of ultrasonic tones may have once sounded like the stuff of science fiction novels, but today it’s reality. These near-silent tones can’t be picked up by the human ear, but there are apps in your phone that are always listening for them. IT security experts […]

Positive Technologies Discovers Vulnerability In ATM Security Software

NCR alert on uptick in ATM skimming

Users of Checker ATM Security urged to install vendor-issued security patch Positive Technologies has discovered a serious vulnerability in GMV’s Checker ATM Security. The defect allows an attacker to remotely run code on a targeted ATM to increase his privileges in the system, infect it and steal money. Checker ATM Security protects ATMs by enforcing a […]

Telephony Flaw That Allowed Hackers To Bypass 2F On Bank Accounts

Hackers: How Much do they Really Make?

A known flaw in the messaging system in Signalling System No. 7 (SS7) protocol developed in the 1970s which allows networks around the world to interoperate, has provided the hole for hackers to bypass 2-factor authentication and transfer money from customers’ bank accounts.  After stealing banking credentials, Cyber criminals were able to leverage the vulnerability […]

Gannett Newspapers Phishing Attack

Phishing up 74% in Q2 2015

Gannett,which owns more than 100 Newspapers across the country has been hit by a sophisticated phishing attack. Bob Noel, Director of Marketing and Strategic Relationships at Plixer International commented below. Bob Noel, Director of Marketing and Strategic Relationships at Plixer International:  “Hackers have become so proficient with phishing emails that they can fool even the […]

Sabre Breach

Following the report about Sabre breach, IT security experts from Prevalent, Inc., VASCO Data Security, FireMon, Cyphort Labs and Varonis Systems commented below. Jeff Hill, Director of Product Management at Prevalent, Inc.: “32,000 properties use Sabre’s reservation system, so the attackers were able to penetrate a single system and potentially access 32,000 additional targets. That’s a good day’s work, but what’s more […]

Gartner Says Organisations Are Unprepared For The 2018 European Data Protection Regulation

Date loss

Analysts Identify Five High-Priority Actions for Data Controllers and Processors Inside and Outside of the European Union STAMFORD, Conn. – The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on 25th May, 2018, according to Gartner, Inc. Gartner predicts that by the end of 2018, more than 50 per cent […]