Saturday, November 17, 2018

Albion Online Massive Multiplayer Game Hit With DDoS

In response to news that the MMORPG game Albion Online announced it was hit with a DDoS attack over the weekend which disrupted play, an expert with Corero Network Security offers perspective. Sean Newman, Director Product Management at Corero Network Security: “Online multi-player games...

Cryptojackers That Target Linux Start Using Rootkits In Order To Hide

With the growing popularity of cryptocurrencies, the number of malware pieces that are called cryptojackers also grows infecting more and more victims. Cryptojackers are hidden cryptocurrency miners that are secretly installed on computers. They use computer resources to mine...

How To Protect Your Information From Getting Tracked And Hacked

Just like CSI uses forensics experts to look for fingerprints, your digital behavior is tracked by businesses and followed by tools like Google Analytics or marketing suites like HubSpot. Except you’re not a criminal, and their goal is to...

Top Ten Cybersecurity Predictions For 2019

1. Increase in crime, espionage and sabotage by rogue nation-states With the ongoing failure of significant national, international or UN level response and repercussion, nation-state sponsored espionage, cyber-crime and sabotage will continue to expand. Clearly, most organisations are simply not structured...

Back To Basics: How To Tackle The Human Element Of Today’s Cyber Threats

With data breaches up 75% in the last two years according to data from the ICO, businesses should be on the lookout for potential threats now more than ever. Most will look to advanced technology to help protect themselves from...

How To Combat Security Stress In The Workplace

Work-related stress and mental illness now accounts for over half of work absences, according to figures released by the Health and Safety Executive (HSE). A further study from Kaspersky found that employees are also suffering high levels of ‘cyber...

Landline’s Loss Is Mobile’s Making

 The world is becoming smaller and the need to be connected whenever, wherever you are, is growing stronger. The advent of smartphones, and features such as Apple’s FaceTime, have made it increasingly easier and cheaper to connect with people...

Why Managing Your IT Inventory Is Vital To Staying Cyber Safe

Cybercrime is a growing epidemic that affects businesses of all sizes. Organisations have a responsibility to protect the data of their employees and customers. So they are investing in expensive hardware and software solutions. Yet businesses don’t realize that...

Four Cybersecurity Myths You Should Stop Telling Yourself

Cybersecurity preparedness is one of the major obstacles facing businesses today, and due to its importance, it can be a magnet for myths. Attacks emerge and cripple systems availability or swipe data quickly and unexpectedly. It happens so fast...

Security v Speed – Why DevOps And Security Teams Need To Play Nicely To Stay Productive

It isn’t news that DevOps and IT security teams often struggle to align their departments and maintain a coherent balance between keeping a business secure and developing new applications to maintain customer interest.  While security processes are a necessity,...

Four Steps To Firewall Automation Success

Firewall automation projects are seemingly all the rage these days, with everyone looking to automate at least some portion of the process. Usually, the goal is to save time and money by automating firewall administration and policy management. However,...

ISMG Security Summit

Having just returned from presenting at a very successful, well attended ISMG Security Summit held in London on 23 October 2018, I was left excited and enthused by some of the presentations I sat in on. In particular a...

The Godfather Part 4 – Cybercrime Isn’t Personal, It’s Strictly Business

Aatish Pattni, regional director of UK and Ireland for Link11 highlights the parallels between today’s organised cybercriminal gangs and their historic predecessors, the Mafia When many of us hear the term ‘Mafia’, we conjure up the thought of ’wise guys’...

Why SQL Injections Are The Cockroaches Of The Appsec World (and how CISOs can eradicate them once and for all)

When someone wants to fly a plane, there is a very rigorous process that ensures training, practical experience, medical checks, safety knowledge and exams before they are able to fly. No-one would dare imagine that they would be let...

Beware Phishing Attacks With Multiple Replica Sign-Ins

With multi-layer cybersecurity defenses improving, hackers are going to the human attack surface with social engineering and phishing attacks like never before. According to industry reports, over 90 percent of breaches start with phishing. And it shouldn’t be a...
SC Magazine

Instagram flaw exposes user passwords

A security flaw in Instagram’s recently released “Download Your Data” tool could have exposed some user passwords, the company reportedly told users. The tool, revealed by Instagram right before the GDPR regulation went into effect, is designed to let users...

Julian Assange Charges, Japan’s Top Cybersecurity Official, and More Security News This Week

Safer browsing, more bitcoin scams, and the rest of the week's top security news.
The Register

SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more

Plus, why is Kaspersky Lab getting into chess? Roundup  What a week it has been: we had the creation of a new government agency, a meltdown flashback, and of course, Patch Tuesday.…

Is retaining a cybersecurity attorney a good idea for your business?

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

Machine Learning Can Create Fake ‘Master Key’ Fingerprints

Researchers have refined a technique to create so-called DeepMasterPrints, fake fingerprints designed to get past security.