Host Integrity Technology from Abatis offers new solution to defeat zero-day malware without signature file updates or whitelists UK-based Abatis was presented with the award for the Most Innovative Product of the Year at last night’s Cyber Security Awards event at the Chelsea Harbour Hotel. Its new patented Host Integrity Technology impressed the judges with its unique zero-day approach to stopping known and unknown malware, from viruses and worms to key-loggers, root-kits, and Trojan-horses. The Abatis solution does not rely on signature file updates, white-listing, heuristic analysis or sandboxing, but instead denies any unauthorised modifications and blocks unwanted write operations…
Author: ISBuzz Team
Cyber London, Europe’s first dedicated cyber security accelerator programme, today held its first ‘Demo Day’ in Hammersmith, London. Founders of the six participating startups, along with two further companiesinresidence, demonstrated the results of their participation in the threemonth programme to a packed audience of investors, businesses, industry experts and government representatives. In addition, it was revealed at Demo Day that one company in the cohort has graduated from Cyber London to the highlyregarded YCombinator accelerator programme based in Silicon Valley. Speaking at Demo Day, Cyber London cofounder Grace Cassy of Epsilon Advisory Partners, said: ‘Cyber Security is vital to the…
Damballa, the experts in advanced threat protection and containment, today released its Q2 2015 State of Infections Report, highlighting how a device hi-jacked for the purpose of conducting ‘click-fraud’ can become a conduit for more serious malware such as ransomware. The study cited an example of how a compromised device, originally exploited for the seemingly innocuous purpose of click fraud – a scam to defraud ‘pay-per-click’ advertisers – became part of a chain of infections, which led within two hours to the introduction of the toxic ransomware CryptoWall – the cyber equivalent of a ‘wolf in sheep’s clothing’. The analysis…
Thousands of controversial .sucks domains emerged from their sunrise period on Sunday 21 June and became available to the general public. But just 20 per cent of the UK’s top brands have snapped them up, leaving the rest in danger from online trolls, according to domain name registrar 34SP.com. 80 per cent of the leading 100 UK brands are yet to register the top level domains (TLDs) that pose a huge reputational threat. Dove, Cadbury, Kitkat, and BBC .sucks domains are just a handful still up for grabs to anyone that wants to buy them. Vodafone, Barclays, ASDA, and ASOS…
Don’t wait for Change. Be the one who makes it happen. Corporate lifecycles are shrinking. The way to sustain a company is to constantly innovate and evolve. Change is therefore inevitable, if not essential. As I wrote in a recent blog, changing everyday behaviour when moving to a culture of compliance is not a question of attitude; it’s a question of action.[1] But change, of course, brings resistance. Integrating new compliance initiatives can be a costly process that requires commitment from those at every level of an organisation. Engaging with the human element in your company – that is your…
The UK automotive industry is back on track after years of decline, with many pointing to the important role it plays in improving the economy. According to the Society of Motor Manufacturers and Traders (SMMT)[1] UK car plants last year produced more than 1.5 million vehicles, the highest number since 2007. By 2017 that number is expected to rise to more than two million vehicles per annum. One of the factors underpinning the increase in UK automotive production has been the decision by car makers to re-shore many of the processes that have been systematically transferred overseas over the past…
Mobile Gaming Applications Hit Hardest, With Close to 2 Million Unauthorised Releases Expected in 2015 Arxan Technologies, the leading provider of application protection solutions, today announced the publication of its 4th annual ‘State Of Application Security Report,’ with new research on the ecosystem for pirated software and digital assets. Conducted by Arxan and iThreat Cyber Group (ICG), the report reveals that illegal reproduction and distribution of copyrighted material on the Web is booming as a result of security breaches in both mobile and desktop software applications. Arxan and ICG analysed data collected over the past three years that examined the…
New Virtual f(n) Delivers Router and Firewall Capabilities Entirely in Software Masergy Communications Inc., a global leader in secure networking and cloud services, today announced Virtual f(n), its virtualised network function platform. Companies can now add routing and firewall capabilities via software, eliminating the need for specialised network appliances and on-site administration. Masergy’s software delivery model is akin to mobile app stores where consumers can download software to their smartphones, turning them into versatile devices to access the Internet, conduct video calls and monitor home security. “Network Function Virtualisation (NFV) lets companies deploy network capabilities via software running on commodity…
June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data including accounting paperwork, employee documents and sensitive customer information, should be a priority. DriveSavers, the worldwide leader in secure data recovery, eDiscovery and digital forensics, has provided these tips to safeguard electronic data before and after a hurricane or tropical storm. Preparation: Electronic devices should be enclosed in plastic bags or watertight containers. Keep devices off the floor to prevent water damage from light flooding. All hardware such as…
Carmine Clementelli of PFU, a Fujitsu company, commented this afternoon on a new report from Trend Micro that North American healthcare organizations appear to be getting hit the hardest by the Stegoloader Trojan. PFU’s flagship product is the iNetSec Smart Finder network security appliance, which is deployed by a large number of healthcare organizations. Carmine Clementelli, Network Security Expert with PFU, a Fujitsu company (www.inetsec.com): “This is a great example of an Advanced Persistent Threat, or APT. Today’s attacks are performed using unknown Remote Access Trojan (RAT) malware or new variations of previously used malware in order to evade and…