Hackers have perpetrated numerous attacks on iMessage users, bombarding unsuspecting Apple desktop and iPhone owners with messages in Chinese in a supposed attempt to steal personal information.
The attack begins as a text message in Chinese from an unknown foreign
With the recent revelations that Yahoo! experienced a hack in 2014 where the accounts of around 500 million users were compromised, it brings back into focus the importance of businesses ensuring their customers’ data is always protected.
More and more
We’ve all had them. Those emails you read with a growing sense of dread which tell you to change the password you use on this account, that social network or one of the many other online services you use.
Sixty-two percent of organisations leave data protection and availability of in-cloud data to third-party cloud providers.
New research from CTERA Networks has revealed that the protection of cloud-based servers and applications hasn’t fully evolved to meet enterprise requirements for business
As high-profile cybersecurity breaches continue to make headlines, businesses are ramping up spending on technology and services to protect their organizations. According to a report by Morgan Stanley, the cybersecurity market should eclipse $60 billion in 2016 and double that
Dubai, United Arab Emirates- 11 October, 2016- Information security (InfoSec) professionals trust the cloud even less now than they did last year, despite efforts by cloud-service providers to tighten security, according to the results of the second annual Cloud Security
Intel Security today launched its 2017 consumer security lineup featuring security innovations to better protect the devices people use every day against the latest threats. The centerpiece of the new portfolio is a next-generation anti-malware engine that offers more efficient
Microsoft has unveiled a range of new security, cloud and intelligence-focused offerings for IT professionals at its annual Microsoft Ignite conference in Atlanta. In the area of security, the company announced that Windows Defender Application Guard is coming next year
The current threat landscape is evolving day-to-day, and with businesses operating within increasingly complex and heterogeneous networks, it has never been more critical for IT teams to protect their organisations from malicious cyber-attacks.
Cybercriminals are becoming more sophisticated in their
When football fans checked their email and uploaded photos from Super Bowl 50 this year, the Denver-based security software startup ProtectWise was monitoring traffic from Levi’s Stadium in Santa Clara, California, for potential threats.
“We were invited by Norwich University’s
Security researcher Brian Krebs’ website KrebsOnSecurity came under “heavy and sustainable” attack after two 18 year-old Israeli hackers were arrested over their connection with a DDoS-for-hire service called vDOS. The arrests coincided with an article, which exposed the two hackers
Cybercriminals are using Google Docs to host a new Facebook scamming tool, which is designed to steal credentials from potential hackers who try to access other users’ accounts.
A newly discovered crimeware service is turning potential hackers into cybercrime victims
Aston Martin and the UK’s Ministry of Defense will be some of Microsoft’s early customers.
Microsoft MSFT -0.10% is introducing a complete set of cloud services from data centers in Britain, its second biggest market for cloud-based software
Cloud data security has been recognised as the most important focus area to improve business competitiveness in a recent survey of executives that also ranked internal user experience second.
Conducted amongst 175 American and European executives, the Unisys/IDG research found
HERNDON, Va., Aug. 10, 2016 (GLOBE NEWSWIRE) — ManTech International Corporation (Nasdaq:MANT) has been awarded two task orders by the General Services Administration Federal Acquisition Service (GSA FAS) on behalf of the U.S. Department of Homeland Security (DHS) to provide
A new study by Ponemon Institute and Gemalto has gone a long way in pinpointing the reasons why so many organizations struggle with cloud security. One of the findings in The 2016 Global Cloud Data Security Study is that our
As the 2016 census night approaches, many Australians have expressed concern surrounding unsecured census data and its potential to reveal to hackers their midi-chlorian count and ability to use the mystical energies of the Force.
Previously retained for 18
Today’s interview is with Aubrey Merchant, federal CTO, Blue Coat Systems. In a town full of vendors that focus on cybersecurity, Blue Coat Systems is well known to a special community. When you listen to the interview with Merchant,
The FBI finally hacked into the San Bernardino shooter’s iPhone with a UFED Touch, a mobile forensic extraction device manufactured by Cellebrite – an Israeli cybersecurity firm.
The UFED Touch is a complete do-it-yourself kit. It looks like a tiny
Two hackers scored an unusual bounty of one million frequent flyer miles for identifying holes in United Airlines’ security system.
That’s enough for each of them to circle the globe five times.
Such awards, known as a “bug bounties” are