FutureFive New Zealand - Consumer technology news & reviews from the future

Cyber attacks stories - Page 105

Thinkstockphotos 1008108484

An expert's take on the state of ransomware today

Wed, 8th Aug 2018
#
malware
#
firewalls
#
network infrastructure
One of the biggest challenges in the fight against ransomware is that there are thousands of variants; tiny pieces of code used over and over again.
Blackberry

BlackBerry integrates ransomware recovery into collaboration platform

Tue, 7th Aug 2018
#
malware
#
uc
#
ransomware
Most ransomware recovery solutions enforce a companywide rollback, meaning even users whose systems were not impacted may lose data.
Fallback

Exclusive: Cloud and blockchain threats creating new channel opportunities

Tue, 31st Jul 2018
#
blockchain
#
casb
#
cybersecurity
While blockchain technology isn't at the same maturity stage as cloud, the channel should start ramping up their security capabilities in that space.
Thinkstockphotos 673891964

Carbon Black claims there's a link between geopolitics and cyberterrorism

Wed, 25th Jul 2018
#
supply chain
#
carbon black
#
cyber attacks
China, North Korea, and Russia are operationalising and supporting advanced cyber militias, says Carbon Black report.
Security wall breach

Has SIEM met its match with today's cyberthreats or is there life in it yet?

Mon, 23rd Jul 2018
#
siem
#
it automation
#
cybersecurity
In its early stages SIEM was a trailblazer but now there are many that say it can't keep up with today's cybercrime - LogRhythm says different.
Thinkstockphotos 180407671

Sophos new server security offering defends 'cybercrime bullseye'

Mon, 23rd Jul 2018
#
firewalls
#
data protection
#
network infrastructure
Sophos has launched Intercept X for Server, a new server security solution that uses deep learning to combat the ever-evolving landscape of cyber threats.
Threat detection

Make the pre-emptive strike against cyberattacks with threat hunting

Mon, 23rd Jul 2018
#
firewalls
#
network infrastructure
#
network security
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Thinkstockphotos 461190643

Mega users affected by credential stuffing attack; 15,000 affected

Thu, 19th Jul 2018
#
iam
#
breach prevention
#
cybersecurity
Data breach at Mega exposes 15,000 users' login details due to reused passwords and credential stuffing attacks.
Thinkstockphotos 802320892

Critical infrastructure protection market to skyrocket in coming years

Tue, 10th Jul 2018
#
hyperscale
#
dc
#
risk & compliance
With crime comes the need for protection and it's certainly no different for critical infrastructure within data centers, a new report finds.
Secure banking

Use of banking trojans up 50%, cryptomining still dominant malware – report

Tue, 10th Jul 2018
#
malware
#
cybersecurity
#
trojan
Check Point's latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Kordia esme obrien

Suffered a data breach? Here's how you manage the fallout

Fri, 6th Jul 2018
#
breach prevention
#
risk & compliance
#
cybersecurity
From a communications perspective, an incident response plan should do one thing: reassure your customers that you care.
Ddos2

Online businesses under siege from botnet DDoS attacks and credential abuse – report

Wed, 4th Jul 2018
#
ddos
#
phishing
#
email security
Attack traffic origination against from China and Russia combined was three times the number of attacks from the US.
Cybersecurity breach2

Despite more training, SMBs feel unprepared for cyberattacks - Webroot

Mon, 2nd Jul 2018
#
malware
#
ransomware
#
phishing
Despite rigorous training, most SMBs in the US, UK, and Australia feel unprepared for cyber threats, says Webroot, highlighting the evolving nature of attacks.
Spending

Spending on AI cybersecurity solutions to increase – GlobalData

Mon, 2nd Jul 2018
#
it budget
#
report
#
globaldata
While cybersecurity has now become a critical business function, it remains a non-core competence for a significant number of boards.
Screen shot 2018 06 26 at 2

SonicWall focuses on the mid-market with latest product announcements

Wed, 27th Jun 2018
#
endpoint protection
#
casb
#
risk & compliance
SonicWall unveils 12 new products, targeting mid-tier enterprises with enhanced cloud-based security management, breach detection, and scalable encryption.
Hybrid cloud2

Cylance extends security products to hybrid environments and private networks

Mon, 25th Jun 2018
#
hybrid cloud
#
cloud security
#
ai security
Cylance unveils CylanceHYBRID and CylanceON-PREM, extending its AI-driven endpoint security to hybrid and private network environments, tackling security gaps.
Thinkstockphotos 696221484 rx4wxqc

The challenges of securing the Ethereum blockchain

Thu, 21st Jun 2018
#
firewalls
#
network infrastructure
#
network security
Over the past 18 months, blockchains & cryptocurrencies have emerged from technical obscurity to capture the attention of investors around the world.
Cybersecurity3 copy

Cyberthreats shifting with ransomware attacks down - research

Mon, 18th Jun 2018
#
malware
#
edutech
#
ransomware
Ransomware attacks are significantly declining, and active defences strategies are highly effective but underutilised, according to ISACA.
Iot1

ForeScout deepens visibility into OT networks with industrial system integrations

Mon, 18th Jun 2018
#
iot security
#
iot
#
partner programmes
New partnerships with Indegy and SecurityMatters continue to forward ForeScout's strategy to secure the extended enterprise.
Cybersecurity breach

DNS amplification attacks rise twofold in Q1 - report

Thu, 14th Jun 2018
#
ddos
#
nexusguard
#
dns attacks
China and the US-dominated as the top two sources of DDoS attacks in Q1, contributing 15.2% and 14.2% of the botnets, respectively.