Archive

Back to homepage
Software

Encryption row spotlights fears on security, privacy

Washington (AFP) – Has encryption technology given the bad guys a way to operate in the dark? Or has the new tech age gifted law enforcement with unprecedented surveillance powers?

Software

ThreatMetrix announces 311 Million bot attacks detected and stopped in Q1 2016; 35 percent quarterly increase

SAN JOSE, CALIFORNIA (PRWEB) APRIL 25, 2016 ThreatMetrix®, The Digital Identity Company™, today released its Q1 2016 installment to the “ThreatMetrix Cybercrime Report.” In addition to the 311 million bot

Software

Dogspectus ransomware campaign relies on Leaked Hacking Team Exploits and Towelroot

Security experts at Blue Coat have spotted a new campaign spreading an Android Ransomware dubbed Dogspectus. The malicious code hijacks mobile advertisements to scam gift cards, it locks the device in a

Software

Shopware update fixes RCE bug that affects both shop and target system

Shopware, an open-source e-commerce software chosen by a number of big European companies to power their online shops, has recently pushed out a critical security update. Read the source article at Help

Industry Insights

Cyber Insurance and Cyber Security

In this new era of the “data breach du jour,” cyber insurance has quickly emerged as a must-have for organizations across all sizes and sectors. But how do you know

Industry Insights

SMEs need to up their security game or risk becoming a target

SMEs are trailing far behind their larger counterparts when it comes to securing their data, according to new research from Versasec. Joakim Thorén, Versasec CEO, says some reasons for the disparity in security readiness

Industry Insights

Service providers a weak link in cybersecurity

Businesses that allow their service providers to access or hold sensitive or confidential data are sitting on a cyber-security time bomb. That’s the harsh word of consulting firm Protiviti, who

Software

GozNym Trojan even more sophisticated with a singular redirection mechanism

Last week, security experts from the IBM X-Force Research spotted a new threat dubbed GozNym Trojan that combines Gozi ISFB and Nymaim malware abilities. The GozNym Trojan is particularly insidious,

Hardware/Network

DDoS Extortionists made $100,000 without Launching a Single Attack

In Brief Cyber crooks find a new and ingenious way to make hundreds of thousands of dollars with no effort. An unknown cyber gang, pretending to be Armada Collective, has

Hardware/Network

Who’s next? Shift focus and detect network attackers – Help Net Security

Who will be the victim of the next major breach? Nearly all enterprises and organizations are sitting ducks for a targeted network attack. Maybe it’s time to take some significant