Email As Top Threat Vector For Businesses

Emails are the top target for cyber criminals to infiltrate businesses through phishing  and spear phishing attacks according to the latest report from Barracuda Networks. The report highlights that 76% of Ransomware attacks start with a phishing email. Michael Patterson, CEO at Plixer commented below. Michael Patterson, CEO at Plixer: “The ransomware threat is growing […]

Insider Threats Are More Risky Than You Think

What is an Insider Threat? According to, an Insider Threat is a current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data and intentionally misused that access to negatively affect the confidentiality, integrity, or availability of the organization’s information or information systems. […]

Authentication Bypass And OEM Backdoors In WiMAX Routers

News broke yesterday that WiMAX routers manufactured by several companies, including Huawei and ZyXEL, are vulnerable to an authentication bypass that could let an attacker change the password of the admin user, gain access to the device, or the network behind it. Ben Herzberg, Security Research Group Manager at Imperva Incapsula:  “The lack of basic security in a wide-spread […]

Organisation’s ‘Keep Everything’ Culture Putting Them At Risk Of GDPR Punishment

A ‘keep everything’ culture puts most businesses at risk of non-compliance with upcoming legislation As the impending GDPR deadline looms, business managers must do more to help their employees treat information responsibly, says Iron Mountain®  The deadline for complying with the new General Data Protection Regulation (GDPR) is just a year away, yet the majority […]

Online Banking Security Incidents Come With A $1.8 (£1.4) Million Price Tag For Banks

Brolux Trojan Targeting Japanese Online Bankers

The crippling financial implications of online banking security incidents have been brought to light by the latest Kaspersky Lab report into cybersecurity threats in the financial sector. The report shows that an accident involving a bank’s online banking services costs the organisation $1,754,000 (£1,371,000) on average – that’s double the price of recovering from a malware incident, […]

The Importance Of Software-Defined Perimeter Security

With the adoption of cloud services, employee mobility and increased inter-organization collaboration, the threat surface for network attacks against application infrastructure increases. In parallel, traditional perimeter defense techniques founded on a basis of trust are unable to cope with the security demands of the new disparate enterprise. This combination leaves the infrastructure unacceptably vulnerable. A […]

Gartner Identifies The Top Technologies For Security In 2017

Analysts Examine Industry Trends at Gartner Security & Risk Management Summit, 12-15 June 2017, National Harbor, MD NATIONAL HARBOR, MD – Gartner, Inc. today highlighted the top technologies for information security and their implications for security organisations in 2017. Analysts presented their findings during the Gartner Security & Risk Management Summit, being held in the US […]

Mazda Cars Can Be Hacked With A USB Flash Drive

News broke earlier this week that some Mazda cars can be easily hack into, by using a USB flash drive plugged into the dashboard to exploit a series of bugs, which have been known about for a number of years. Art Dahnert, Managing Consultant at Synopsys commented below. Art Dahnert, Managing Consultant at Synopsys:  “This kind of story is indicative of the […]