Malware

Email based cyberattacks remain one of the most vulnerable vectors: Report

Cybercriminals use social engineering techniques to trick users into providing login credentials, initiating fraudulent transactions or unknowingly install ransomware.

Newegg confirms credit card information was taken in a sophisticated attack

Electronics retailer Newegg has confirmed that credit card information taken during the last month appears to have been stolen via a JavaScript injection.

What is Magecart and was it behind the Ticketmaster and BA hacks?

The phenomenally damaging cyberattack on British Airways last week saw the haemorrhaging of information from over 385,000 transactions, credit card and personal details included.

Zscaler achieves AWS Security Competency status for zero trust

Enterprises using ZPA can create micro-segmented architectures without virtualizing the security stack and creating complex firewall policies.  

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

Human behaviour is the new perimeter: Matt Moynahan, Forcepoint

Digital identities will be the ultimate weapon for CSOs against the hackers says Matt Moynahan, CEO, Forcepoint.

Seqrite launches Seqrite Secure Web Gateway for enterprises

Built on a powerful machine learning engine, Seqrite SWG offers protection against advanced Web threats 

Partner Content
Top 5 IT tips for remote and mobile teams

In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the United States. 

Partner Content
How to detect targeted cyber attacks: the importance of context

Cyber security is high in our collective awareness and we have more advanced technologies available than ever before. Still, companies struggle to detect breaches.
 

Burning down the house: CEO attitudes to cyber security all wrong

Security In Depth has just published the results of research which found 83 per cent of Australian companies have no policies or plan in place for a data breach and 41 per cent said they “did not understand” what an ICT security framework was.

Partner Content
4 Ways to Breach-proof Your Bank’s ATMs

‘ATM Cash-out’ is a meticulously planned, highly choreographed, global cyber attack wherein hackers breach a bank or payment card processor’s cybersecurity systems and use cloned debit cards at multiple ATM machines around the world to fraudulently withdraw millions of dollars within a short period of time. 

Do you still need a firewall?

Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.