Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to allow a quick and understandable cyber-trend analysis. DyTA enables cyber-intelligence analysts and CISOs to understand and analyze the threat level of each attacker and attack method relevant to their organization, according to their geo-political region, industry sector and corporate assets.
Author: ISBuzz Team
Nearly a quarter (22 per cent) of parents feel they cannot control what their child sees or does online, although nearly half (48 per cent) worry that they may face cyberbullying, a survey conducted by Kaspersky Lab and B2B International reveals. In line with this, recent in-depth interviews with young children and parents reveal that the reason young children could be at increased risk of cyberbullying is that their parents are not discussing or addressing the dangers at an early enough age.
Mobile enterprise environments increasingly targeted by embedded spyware, adware and back-doors, according to analytics from Veracode’s cloud-based security platform
The Kaspersky Lab study ‘Children Online’ reveals that in 2014 more than two-thirds (68%) of users of Kaspersky Lab’s Parental Control technologies encountered inappropriate or dangerous content online. Adult content, gambling and sites carrying information about weapons were among the most prevalent threats detected by Kaspersky Lab’s protection technologies.
Don’t get too smart on payments by phone Research by two of the UK’s leading experts on the social impact of technology shows that slick smartphone payment systems may boomerang on retailers.
The first malware to successfully outwit the CAPTCHA image recognition system has been detected by Kaspersky Lab’s security analysts. The Trojan-SMS.AndroidOS.Podec has developed a technique to convince CAPTCHA it is a person in order to subscribe thousands of infected Android users to premium-rate services.
By now, emails with malicious links or attachments are not a new trick. Hackers have perfected the devious art of crafting email headlines that recipients are likely to open, read and click so that they can steal information or infect their computers. While many consumers are wise to the presence of these ploys, even the savviest of people can still be lured into one of these traps. Here’s a look at the most commonly used subject lines that result in opened malicious emails, along with some precautions you can take to make sure you don’t end up as the next…
Wombat is enabling the large organization to reduce its susceptibility to cyber security attacks, saving hundreds of hours in remediation time.
March’s Microsoft Patch Tuesday bulletin has just been released and David Picotte, manager of security engineering at Rapid7, has the following thoughts to share:
Managing the Cyber risk to the global shipping industry Part I Threats to cargo handling systems and terminal operation systems (TOS)