Technology news from the future
These search results are from across the Techday Network of sites
Centrify gets flexible with privileged access deployment
“The ability to deploy the Centrify Privilege Service either on-premises or in a private cloud is an attractive option for customers."
Are you prepared for a cyber attack? Ransomware removal and protection guide
Cyber criminals are attacking with increasing frequency and effectiveness, and your business is on a target list. Are you prepared?
YOU’RE INVITED: Softsource Security and Compliance – security concerns for Kiwis
Softsource is hosting an event to give Kiwi businesses insights into security concerns that organisations within the country are facing every day.
Operation Ghoul targets industrial sector with spear phishing malware
Operation Ghoul is targeting the industrial & engineering sectors worldwide, hitting more than 130 organisations in 30 countries, says Kaspersky Labs.
Nearly half of AU organisations not equipped for malicious insiders
Mimecast Limited recently released new data that reveals the majority of organisations believe they are their own worst enemy.
Afraid someone is misusing your webcam? Here's some tips for protection
If you want to know which programs are using your webcam, or if you believe it is running despite the indicator light being off, here is a guide.
Cyberattacks skyrocket: Arbor releases global DDoS attack data for 1H 2016
Arbor Networks recently released global DDoS attack data for the first six months of 2016 that paints a pretty grim picture.
FireEye's latest security feature detects and protects from ransomware
FireEye have recently detected a cerber ransomware campaign with Exploit Guard, a new feature of FireEye Endpoint Security (HX).
Researchers report cyber security risks in 3D printing
Provided the printer is connected to the Internet, hackers can make their way in and introduce internal defects as the component is being printed.
Enfal threat still causing havoc to businesses after seven years of mayhem
Verint Systems highlights the continued threat of the Enfal malware, which has been lurking since 2004 but has been most active over the last 7 years.
Have you met Delilah? The first Insider Threat Trojan
Criminal recruitment of insiders is becoming an industry now with the release of a new Trojan called “Delilah”.
Is any network 100% safe? Tips for hardening cyber defences
With the evolving tech landscape, it is almost impossible to guarantee network security - here are some tips for hardening cyber defences.
Cyber attacks on banks are a global scourge - are you safe?
Hackers might find it far easier to infiltrate banks in Phnom Penh as Paris, or Lhasa as London.
Reinventing next-generation firewalls for coordinated protection
The escalation in volume and complexity of cyber threats today have compelled organisations to turn to next-generation security solutions.
Insider threats escalate and thrive in the Dark Web
Disgruntled employees are gladly selling their services to the bad guys in order to inflict harm on their employers.
Check Point research: 2300 active global malware families - and they're growing fast
The amount of global malware families just keeps going, with an increase of 15% in May 2016, totalling 2300 unique and active malware families.
Scammers claim there is a virus in Apple’s iTunes database
Scammers are once again targeting Apple customers in their attempt to hijack accounts and steal payment information. Here's the rundown.
New Sofacy attacks against US government agency
Recently, Unit 42 identified a spear phishing e-mail from the Sofacy group that targeted the United States government - here is a rundown.
Fight against spam now a global effort
Enforcement agencies from around the world including New Zealand have signed a Memorandum of Understanding to fight against spam.
McAfee report: Mobile collusion app attacks on the rise, W32/Pinkslipbot Trojan back
McAfee Labs Threats Report: June 2016 shows that mobile app collusion and the W32/Pinkslipbot Trojan are the biggest cyber threats lurking.
From a drip to a flood - the impact of a data leak
Data leaks, especially from an organization’s point of view, are a huge and growing problem, as the fallout can be devastating.
Facebook Messenger hack exposed: Expert insights and advice
A recently discovered vulnerability in Facebook Messenger could have had monumental consequences - here is some advice for protecting yourself.
Protecting email is essential to your security strategy
Fortinet’s Gary Gardiner explains why email security is perhaps the most cost-effective network protection you can deploy.
How to shift the economic balance of cyber attacks
A harsh reality for the information security sector is that the businesses we are asked to protect are battling businesses that are built to attack.