Cyber Crime Costing Londoners £26 Million Per Month

Scotland Yard is warning of the stark reality that Londoners are losing on average £26 million a month due to cyber fraud and attacks on businesses and individuals. About 3,500 victims of cyber fraud are recorded in the capital each month, with phishing emails, ransomware and malware the most common scams. Detective Chief Superintendent Mick Gallagher, head […]

Microsoft Stops Malware Campaign That Tried To Infect 400, 000 Users In 12 Hours

Azure SQL and SQL Server 2016

Today, Microsoft revealed that its Windows Defender stopped a large malware distribution campaign. It had tried to infect more than 400,000 users with a cryptominer.  Detection was attributed to computers infected with the Dofoil malware —also known as Smoke Loader— a popular malware downloader. Andy Norton, Director of Threat Intelligence at Lastline commented below. Andy […]

Complex New Cryptojacking Attack Powered By NSA Exploit

Researchers from Imperva have just discovered an extremely complex cryptojacking attack dubbed RedisWannaMine, which is powered by Redis and NSA exploits and aimed at both database servers and application servers. The attack is a new generation cryptojacking attack, which demonstrates worm-like behaviour combined with advanced exploits to increase the attackers’ infection rate and fatten their wallets. […]

Georgia Anti-Hacking Legislation A Serious Threat To Cyber Security Industry

cyber attack

Security researchers are extremely worried by the Senate Bill 315, also known as the Computer Intrusion Bill, which threatens to criminalize security researchers. The bill would expand the state’s current computer law to create what it calls the “new” crime of unauthorized computer access. It would include penalties for accessing a system without permission even if no […]

10 Ways To Improve Security Compliance With Data Privacy Regulations

Failing Grade on Data-Privacy Rights

Rapid technology advances have brought new challenges for the protection of personal data, and so every organisation needs a comprehensive approach to privacy management. They must also document how they collect, process and store personal data. But too many companies still fall down on the security fundamentals and new regulations such as the General Data […]

Microsoft Shoves AI Into Windows 10, Neglects To Let Consumers Know Of Security Risks

Following news that Microsoft is putting AI and Machine Learning tools into the latest versions of Windows 10, Etienne Greeff, CTO and Co-founder at SecureData commented below. Etienne believes that in the rush to adopt the latest technology the myriad potential security problems with this technology will be overlooked by the consumer. Worse yet, they […]

Prolific Cyberespionage Group Sofacy Shifts Focus To The Far East, Warns Kaspersky Lab

Sofacy shifts focus to include Far East defense and diplomacy, overlaps with advanced cyberespionage groups Kaspersky Lab researchers have observed that the Russian-speaking threat actor Sofacy, also known as APT28 or Fancy Bear is shifting its targeting to the Far East, with a strong interest in military, defence and diplomatic organisations – in addition to its traditional NATO-related targets. The researchers […]

Why Some Companies Are Embracing Blockchain

Bitcoin debuted nearly a decade ago yet it seems that we still haven’t reached a consensus as to whether it will survive and prosper. Cryptocurrencies like Bitcoin have exploded in popularity, surged greatly in terms of valuation, and withstood cynicism from established institutions and prominent investors. Still, decentralized currency seems like an unsavory prospect to […]

ANNOUNCEMENT: Check Your Router – Kaspersky Lab Discovers Slingshot Malware

Slingshot: the spy that came in from the router Kaspersky Lab researchers have uncovered a sophisticated threat used for cyber-espionage in the Middle East and Africa from at least 2012 until February 2018. The malware, which researchers have called ‘Slingshot’, attacks and infects victims through compromised routers and can run in kernel mode, giving it […]