Archive

Back to homepage
BYOD/Big Data

Big data: A strategic cyber target

Big data has captured the headlines for a number of months now. Some estimates project that data will grow to the exabyte (1,000 gigabytes) level in the next few years and

Mobile

Mobile Security (mSecurity) Market Research Report 2016 | Patriarc

The Mobile Security (mSecurity) Bible: 2014 – 2020 – Device Security, Infrastructure Security & Security Services. Mobile networks around the globe generate more than 86 Exabytes of traffic annually. The

Hardware/Network

China is the top target for DDoS reflection attacks

China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of the 21,845 attack events

Software

Xen Project plugs critical host hijacking flaw, patch ASAP

China bore the brunt of DDoS reflection attacks last month, with 61 percent of the top attack destinations observed hitting Chinese-based systems, according to Nexusguard. Of the 21,845 attack events

Identity Theft

British Gas customers’ data posted online, 2,200 records exposed

Data belonging to thousands of British Gas customers have been posted online, the company has already contacted 2,200 users to warn them about the data breach. The customers’ records leaked

Mobile

Android infostealer masquerading as MS Word document

A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users. “The malware portrays itself as a data file with an icon similar to

Software

CoinVault and Bitcryptor ransomware victims don’t need to pay the ransom

Kaspersky Lab has added an additional 14,031 decryption keys to their free repository, enabling all those who have fallen victim to CoinVault and Bitcryptor ransomware to retrieve their encrypted data

Software

Traditional Security Tools Delaying Response Capabilities

Survey Reveals that 44% of SANS Community Sharing Breach History Had Sensitive Data Accessed 75 to 96% of Respondents Use Traditional Security Tools Such as Firewalls, IDS, IPS and Anti-Malware

Industry Insights

How to win the cyber security arms-race

The chief executive of broadband and telecoms operator TalkTalk has warned of a “cyber security arms race” threatening all UK companies as she revealed she called in defence experts over

Software

CryptoWall 3, the Cyber Threat Alliance and the Future of Information Sharing

The Palo Alto Networks vision for threat information sharing is that cybersecurity vendors should share the intelligence that they all individually collect with each other and with whomever else has the