News

Recent global malware attacks have alerted even companies making devices which are not normally subject to virus assaults to sit up and take notice.HP announced on Monday embedded security features...
Sep 12, 2017
383
0
The number of denial-of-service (DoS) or distributed-denial-of-service (DDoS) cyberattacks doubled from 3% to 6% in 2016, mainly because of insufficient security controls of Internet of Things (IoT)...
May 25, 2017
1,260
0
While traditional manufacturing industries were not designed with security in mind, the proliferation of networks and devices, disparate communication channels, and the use of off-the-shelf software...
Sep 15, 2015
3,513
0
As many as 888 data breach incidents occurred globally in the first six months of 2015, compromising 246 million records, according to the latest Breach Level Index published by digital security...
Sep 11, 2015
4,271
0
An report by economic and cybersecurity experts at RAND has found that CISOs often face a chaotic and confusing landscape when deciding the most efficient and cost-effective way to manage the risks...
Jul 08, 2015
6,997
0
Arbor Networks has registered three new patents for different aspects of distributed denial-of-service (DDoS) attack detection and mitigation. Arbor now has 25 patents focused on DDoS defense. Arbor...
Jul 08, 2015
3,911
0
While the move to the cloud and BYOD and regulatory pressures is pushing organisations to improve their security posture, the emergence of sophisticated threats like targeted attacks, APTs, and...
Jun 12, 2015
5,605
0
Malware rose at an alarming rate in 2015, indicates Check Point's Security Report. 106 unknown malware hit an organization every hour: 48 times more than the 2.2 downloads per hour reported in 2013,...
Jun 03, 2015
2,953
0
Increasingly, companies are exploring a more “active defense” approach to cyber security, while preparing for an entirely new set of threats to medical data, connected vehicles, mobile payments, and ...
May 08, 2015
1,983
0
‘Cyber threats in 2014 combined new techniques with the old, resulting in highly evasive attacks that posed a significant risk for data theft,’ says Charles Renert, vice president of security...
May 08, 2015
1,945
0
A new report provides overwhelming evidence that cybersecurity attacks emanating from Iran and targeting U.S., Europe and Western interests are increasing at an alarming rate. The report, co-authored...
Apr 30, 2015
1,782
0
A report by Pulse Secure Mobile Threat Center research facility found there continues to be an increase of Android developed malware in an attempt to turn a profit. The research also illustrates that...
Apr 30, 2015
1,481
0
A new mobile security risk report by Aruba Networks reveals that businesses are ill prepared for the high-risk, high-growth mindset of the #GenMobile workforce, creating alarming disparity around...
Apr 30, 2015
1,275
0
Phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014, says APWG The number of brands being attacked remains high, and malware variants continue to...
Apr 14, 2015
2,116
0
This means that the sites are either already compromised or running vulnerable software -- increasing exposure to attack for anyone visiting those sites. In 2014, businesses lost nearly $400 billion...
Apr 10, 2015
1,605
0
There was a time, not too long ago, when security was viewed as insurance, and investments were hard to come by. However, the rapidly changing business dynamics and increasing data breaches have...
Mar 27, 2015
1,668
0
In surveying more than 800 security decision makers and practitioners, CyberEdge found that more than 70 percent of respondents’ networks had been breached in 2014 — up from 62 percent in 2013 — with...
Mar 13, 2015
1,366
0
A vulnerability discovered recently could prove to be the final nail in SSL’s (Secure Socket Layer) coffin.  The latest vulnerability to hit SSL, called ‘Factoring attack on RSA-EXPORT Keys’ (or...
Mar 13, 2015
1,045
0
From data center to boardroom, how do you see the responsibilities of CSOs evolve?CISO now shares common responsibility of all cyber crimes committed in his organisation. For example, if an...
Mar 05, 2015
1,261
0
Researchers reviewed popular apps with more than 50,000 downloads to assess their exposure to a common vulnerability, and found that 31% of them were exposed to it. Of those, 18% were in categories...
Mar 03, 2015
1,695
0
Along with the alarming growth of the user base for Android run handsets around the globe, it has also become the most vulnerable mobile OS. This is evident from the fact that many popular apps such...
Feb 11, 2015
1,786
0
Protection is still the main driver for security, but a new study released today reveals that organizations understand the application economy demands a new view and approach to security. The study,...
Feb 11, 2015
2,643
0
By 2017, twenty per cent of the white-collar workforce in India will access enterprise data (beyond email and calendar) on personal devices, according to Gartner. By 2020, at least two-thirds of...
Feb 09, 2015
1,324
0
DOWNLOAD the report from the link given below. Highlights: Compared to Q4 2013 57 percent more DDoS attacks 52 percent increase in average peak bandwidth 51 percent more application layer attacks 58...
Feb 06, 2015
1,274
0
A DDoS attack on a company's online resources might cause considerable losses - with average figures ranging from 32 lakh to 2.74 crores depending on the size of the company, according to Kaspersky...
Feb 06, 2015
1,234
0
Merging the roles of information security officers and the physical security specialists is one of the latest security trends among organisations.  We take a look at what drives converged IT and how...
Jan 21, 2015
4,308
0
1.   Identity-aware organizations will adopt an “identity dial tone”: The application economy and increased use of mobile apps is driving a need for a centralized, common way to access identity and...
Jan 20, 2015
1,746
0
Rising at alarming rate, the number of cyber crimes in India may touch a humungous figure of 3,00,000 in 2015, almost double the level of last year causing havoc in the financial space, security...
Jan 06, 2015
2,153
0
Reports surrounding the Sony data breach are missing a simple, critical concept, says Linda S. Millis. "Lost, stolen or sold credentials caused each breach. Servers respond to authorized credentials...
Dec 31, 2014
1,313
0
Dark clouds over Internet of Things (IoT)This year IoT will gain wider visibility due to its advancements as well as vulnerabilities. As SCADA systems adopt IOT, their exposure to cyber threats will...
Dec 29, 2014
833
0
1. Exploit mitigations reduce the number of useful vulnerabilities: Cybercriminals have for years feasted on Microsoft Windows. Fortunately, Microsoft has invested in exploit mitigations, which makes...
Dec 24, 2014
975
0
The predictions from the IDC FutureScape for Datacenter are: 1. By 2016, 65% of organizations' infrastructure investments will target creation and expansion of 3rd Platform systems of engagement and...
Dec 24, 2014
1,092
0
Schneider predicts four notable milestones will impact cybersecurity in 2015: More breaches. At an October cybersecurity event cohosted by the U.S. Secret Service, the FBI and the Financial Services...
Dec 19, 2014
1,294
0
The report shares which malware gave cyber criminals the biggest bang for their buck by recycling code and methods from previous malware to gain access to the most coveted cyber targets.  1st place: ...
Dec 18, 2014
873
0
One-third of large enterprises engaging in digital business models and activities will also have a digital risk officer (DRO) role or equivalent, says Gartner.  By 2020, 60 percent of digital...
Dec 12, 2014
1,175
0
Preventing and managing data breaches have become two of the highest priorities facing businesses today. Experian Data Breach Resolution announces the release of its second annual Data Breach...
Dec 03, 2014
950
0
Based on the latest Intel Pentium and Intel Celeron Processors, the NGFW and UTM are up to 61 percent faster than competing solutions, and up to149 percent faster performing HTTPS inspection, says...
Dec 03, 2014
1,034
0
The Equinix Cloud Exchange is an advanced interconnection solution that enables on-demand and direct access to multiple clouds and networks inside Equinix IBX data centers. By bringing together cloud...
Dec 02, 2014
1,007
0
HP announced expanded support for new cloud-based payment platforms as well as Europay, MasterCard, Visa (EMV) issuance with its HP Atalla Network Security Processor (NSP). These enhancements extend...
Nov 28, 2014
656
0
More cybercriminals will turn to darknets and exclusive-access forums to share and sell crimeware. Increased cyber activity will translate to better, bigger, and more successful hacking tools and...
Nov 28, 2014
997
0
Data centers have evolved significantly to keep pace with growing business demands. Operators in these centers are under immense pressure to roll out new applications and services faster than ever...
Nov 27, 2014
614
0
Akamai Technologies released a new cybersecurity threat advisory which alerts banks and enterprises to the use of Yummba webinject tools in banking fraud. The advisory is available for download here...
Nov 27, 2014
729
0
Healthcare sector will see an increase in data stealing attacks Healthcare records hold a treasure trove of personally identifiable information that can be used in a multitude of attacks and various...
Nov 27, 2014
673
0
Although organizations have made strides in establishing best practices for the IT audit function, many are struggling to keep pace with global IT risks amid rapidly changing technology environments...
Nov 27, 2014
642
0
An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008, says a Symantec report. A back door-type...
Nov 25, 2014
840
0
Healthcare sector will see an increase in data stealing attacks Healthcare records hold a treasure trove of personally identifiable information that can be used in a multitude of attacks and various...
Nov 20, 2014
1,103
0
As much as 40% of mobile application vulnerabilities detected are related to unsafe handling of data, says Indusface, a provider of application security solutions for web and mobile applications. ...
Nov 12, 2014
780
0
The role of cyber information security officer (CISO) has been enhanced with a number of high-profile security breaches and organizations are increasingly realizing that they must augment their...
Nov 11, 2014
2,179
0