Proxy Cyberwarfare, GDPR And Blockchain – The Prospects For Security In 2018

The last year has been a significant 12 months in the short history of cyber security, with headline security breaches such as Uber and a scramble to come up with new approaches, particularly as the European Union’s General Data Protection Regulation comes into force next May. 2018 will see further developments in this dynamic field […]

RubyMiner Malware Used To Mine Cryptocurrency From Outdated Windows And Linux Servers

Malware Ranks First

News has surfaced that a new strain of malware called RubyMiner is being used by cyber criminals to target outdated Linux and Windows serves to secretly mine cryptocurrency. According to Check Point researchers, the criminal has been using RubyMiner to plant the cryptocurrency miner XMrig on vulnerable systems to hijack users’ CPU processing power and covertly mine […]

WEF Global Risk Report 2018

Vulnerabilities in WordPress and Horde

Joseph Carson, Chief Security Scientist at Thycotic: “Many industries are going through what is deemed as the fourth industrial revolution. With the maritime industry shifting to advanced technologies to help drive smart and intelligent shipping, these provide very exciting and innovative opportunities and are the biggest advance in maritime operations since the advent of the steam […]

Cybersecurity Education – It’s Time To Do More Homework

The education sector is an increasingly popular target for hackers due to the sheer volume of rich personal and research-based data open to attack. Technology has a dramatic impact on the way we live and learn, putting relentless pressure on institutions to remain agile, accessible and secure. This becomes particularly important against a shifting backdrop […]

As The Cloud’s Popularity Grows, So Does The Risk To Sensitive Data

A new survey – part of the Ponemon Institute “2018 Global Cloud Data Security Study” – showed that despite the increasing adoption of cloud services worldwide, there is a wide gap in the level of security precautions applied by companies in different markets. The survey found that organizations in the UK (35%), Brazil (34%) and […]

Chrome Extensions For Click Fraud

Security Researchers from ICEBRG have discovered 4 Chrome Extensions with malware code that was available through the Chrome Web Store. The malicious code allowed attackers to send commands to a users’ browser and used this for clickfraud. Alex Calic, Chief Strategy and Revenue Officer commented below. Alex Calic, Chief Strategy and Revenue Officer: “The digital ecosystem […]

Skygofree: Highly Advanced, Powerful Android Surveillance Software Active Since 2014

Kaspersky Lab researchers have uncovered an advanced mobile implant, active since 2014 and designed for targeted cyber-surveillance, possibly as an ‘offensive security’ product. The implant, named Skygofree includes functionality never seen in the wild before, such as location-based audio recording through infected devices. The spyware is spread through web pages mimicking leading mobile network operators. […]

New DDoS Botnet Targets ARC-Based IoT Devices

Following the news of  Mirai Okiru: the new DDoS botnet that’s targeting ARC-based IoT devices. Mike Schuricht, VP of Products at Bitglass commented below. Mike Schuricht, VP of Products at Bitglass: “This new botnet, as with the recent Spectre bug, demonstrates the challenges with securing low-level hardware and the threat posed by uncontrolled endpoints. Where endpoints are vulnerable, sensitive […]