A research conducted by experts at Symantec highlights disturbing security failures in the IoT devices present in today connected home. The purpose of IoT is connect all type of devices that we have at home, let’s say I am at my work and I want to arrive at home and have my air conditioner at […]
A unit of Canada’s Bank of Montreal will launch on Monday its network of cardless ATMs, a technological innovation to improve users’ security. Recently we have discussed different kinds of attacks against ATM machines, the majority of which were conducted by exploiting hardware skimming. Black box attacks and malware based attacks are a few sample of methods recently observed […]
71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report. The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in line with similar studies confirms the increase in the number of successful cyber attacks against organizations. The report analyzed data provided by 814 organizations, it […]
DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR report related to the period September 2014 – February 2015. The ICS-CERT MONITOR report According to the report, the Industrial Control Systems […]
Banning Tor network would bring a lot of public distress and would raise reactions, according to Governmental advisors and thus David Cameron is left without support on the matter of banning encryption. The MPs know really well that the Internet is a really magnificent service that can be used in an excellent manner by simple […]
Pocketables revealed that Google is secretly working on a Virtual Private Network (VPN) service named Google VPN for use on open WiFi networks. Google is working to improve security of its mobile users, according to people at Pocketables the IT giant is secretly working on a Virtual Private Network (VPN) service, dubbed ‘Google VPN’. “Unfortunately, […]
Adobe released security updates for Adobe Flash Player to fix 11 Critical Vulnerabilities, most of them Remote Code Execution flaws. Adobe has issued a critical update for the Flash Player product that fixes set of 11 critical security vulnerabilities in its software. The update is classified as critical because most of the security flaws could […]
Data exfiltration is mechanism to data breach that occurs when an individual’s or organization’s data is illegally copied from its systems. It’s not a matter of “if” you will be attacked, but “when”. Preventing attackers from breaching our system is a necessity and stopping them before they can complete their mission is a requirement. Analyzing […]
TeslaCrypt is a new strain of ransomware, spotted in the wild by experts at Emsisoft, which is also targeting users of principal gaming platforms. A new strain of ransomware dubber TeslaCrypt was spotted in the wild by the researchers at the security firm Emsisoft. TeslaCrypt was discovered at the end of February, researchers at Bromium that analyzed the […]
A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that is made with mobile devices and from the policies adopted to protect the company from cyber […]