Businesses Report All-time High Levels of Fraud, Cyber and Security Incidents in 2017

Fraud, cyber, and security risks are at an all-time high, according to senior corporate executives surveyed worldwide for the 2017/18 Kroll Annual Global Fraud & Risk Report. The proportion of executives reporting that their companies fell victim to at least one instance of fraud over the past 12 months increased to 84%, from 82% in the […]

6 ways hackers will use machine learning to launch attacks

Defined as the “ability for (computers) to learn without being explicitly programmed,” machine learning is huge news for the information security industry. It’s a technology that potentially can help security analysts with everything from malware and log analysis to possibly identifying and closing vulnerabilities earlier. Perhaps too, it could improve endpoint security, automate repetitive tasks, and even […]

9 Steps to More-Effective Organizational Security

Having a robust and well-defined organizational security framework — one that focuses on both information technology and security — is crucial for fulfilling business requirements. Too often security can be viewed as a barrier, but ultimately, it’s the only way to help protect the enterprise from threats and avoid a data compromise. Tim Bandos, Senior Director […]

Your website is under constant attack

There’s this popular fallacy that attackers on the internet always target particular sites. They don’t. Yes, some do, but most attacks are made by bots, which don’t know a thing about you, your business, or your website. Bots don’t care who you are or what you do. If you’re on the web, you’re a target. […]

Why the Cloud is more secure than storing data on site

We have all heard about how cloud services provide better utilization of resources through maximum optimisation but very few know that storing data in the cloud is more secure than storing it on premises. Forget individuals, even the big and global companies have difficulties storing their data and for them, cloud services are the only […]

Samsung brings Knox security to smart fridges and TVs

Samsung’s Knox security is no longer limited to running on phones and tablets. The company has announced that it’s integrating Knox across its connected devices, including TVs, appliances and even digital signs. As on mobile gear, it combines hardware and firmware updates to catch attempts to compromise a device. Read how Samsung intends to make […]

Own a Mac, Windows PC or a smartphone? You need to update now!

Apple says all of its Macs, iPhones, and iPads contain a security flaw that requires an update. It’s not alone. Any owner of a PC, tablet or smartphone should make sure that automatic software updates for their operating systems are enabled after security researchers this week revealed a broad flaw in Intel and other chips […]

Hackers have released the exploit code for Huawei router vulnerability that helped to enable the Satori IoT botnet

Remember the dreaded Satori Internet of Things botnet that helped bring down hundreds of websites last month. For the uninitiated, the Satori Internet of Things (IoT) botnet disrupted the services of hundreds internet service providers (ISPs) earlier this month taking thousands of users offline. The Satori IoT botnet was traced to a vulnerability in Huawei […]

Top 10 Tips To Protect Yourself From Hackers

Online security has become more and more risky with a data breach happening every day. You should be aware of the risks that cybercriminals, scammers, and fraudsters pose to you. Right from stealing your personal identifiable information, stealing your bank account information to installing ransomware, cybercriminals leave no stone unturned to mint money from you. […]

Infosec expert viewpoint: Google Play malware

Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Read what infosec experts think about the security of Google Play, what they think Google should do better, and what users can do in order to protect themselves from malicious apps […]