This hypnotic, terrifying map charts cyberattacks in real-time

What is the colour of a cyber attack? The harsh blue screen of a crashed computer, or something more elaborate? Kaspersky has created a real-time cyberattack map using data derived from its security systems, showing the spread of threats across the globe in trails of pink and blue. Read/see the realtime cyber security threat map […]

PayPal CEO offers sobering view of cybersecurity threats

Credit unions and other financial institutions have long been concerned about fintechs cutting FIs out of the banking equation, but the CEO of PayPal assured credit unions that his company views them more as partners than competitors. Read the views of Dan Schulman of PayPal about cyber threats on Credit Union Journal.

Adopt security-by-design mindset to combat new cybersecurity threats, says GovTech’s Chai Chin Loon

“As threats grow in scale and sophistication, our approach in addressing them must evolve too,” asserted Chai Chin Loon, senior director of the cybersecurity group of Singapore’s Government Technology Agency (GovTech). He was speaking at the recent Computerworld Singapore Security Summit. Read why GovTech’s Chai Chin Loon says that organisations must adopt security-by-design mindset to […]

New hacking threats: Fingerprint reader vulnerabilities and sophisticated ransomware

A massive cyberattack that struck 300,000 computers in 150 countries earlier this month has begun to slow, but experts warn there is more to come — including the ability to hack fingerprint readers. “It is going to get worse before it gets better because we’ve becoming more reliant [on technology]… Read how fingerprint reader vulnerabilities and […]

‘Internet of things’ brings with it threats to security

Read why Robert J. Samuelson says that Internet of Things devices bring threats to security on Spokesman : The United States may have escaped most digital damage from the global “ransomware” virus, though cyber experts fear more attacks. One possible explanation is that the malicious software (“malware”) harms older versions of Microsoft’s Windows operating system, […]

Reporting ransomware, other cyber threats -your legal obligations

The Wannacry ransomware outbreak that continues to unravel across the globe is the latest in a long line of prominent cyber security threats. With time, these attacks are only likely to become more frequent, sophisticated and widespread. Read about your company’s legal obligations for reporting ransomware and other cyber threats on ET CIO.

10 ways cyber security will evolve in the face of growing threats

The cyber threat landscape is constantly evolving, with different strains of malware attacking network systems every day. Organisations are losing the cyber war and, as a result, cyber security needs to evolve to combat the growing problem created by cyber attacks. Read about the 10 ways in why cyber security will evolve over the years […]

10 ways cyber security will evolve in the face of growing threats

The cyber threat landscape is constantly evolving, with different strains of malware attacking network systems every day. Organisations are losing the cyber war and, as a result, cyber security needs to evolve to combat the growing problem created by cyber attacks. Read about the 10 ways in which cyber security will evolved to face the […]

Cyber threats still on the rise

Read Marlene Y. Satter’s article on how cyber threats affect investors on Benefits Pro : Whether the targets are direct deposits, W-2s, hospital records or data being held for ransom, the danger of being hit by a cyberattack is on the rise, and businesses need to be on their best game to protect themselves. Read her […]

Three Of The Biggest Cyber Security Threats To Australian Business

Read Libby-Jane Charleston explain the top three cyber threats to Australian businesses on Huffington Post : With consumer phishing email at an all-time high and Business Email Compromise (BEC) costing Australian businesses $3.1billion since January 2015, it’s more crucial than ever that people are aware of the ways attackers use to compromise your business. Read her […]