Consumer technology news from the future
These search results are from across the Techday network of sites
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
CERT NZ highlights rise of unauthorised access incidents
“In one case, the attacker gained access and tracked the business’s emails for at least six months. They gathered extensive knowledge of the business’s billing cycles."
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
A clear case for AI in endpoint protection
Today, AV has an alternative, and it is Artificial Intelligence (AI).
WatchGuard’s eight (terrifying) 2019 security predictions
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Financial services breaches nearly triple in two years - Bitglass
“Financial organisations regularly handle sensitive, regulated data like home addresses, bank statements and Social Security numbers.”
Conspiracy looms: NSS Labs takes CrowdStrike, ESET, Symantec & AMTSO to court
Cybersecurity testing organisations NSS Labs is accusing three major security firms and an industry body of boycotting independent security tests of their products.
Remote administration tools bring unexpected threats to industrial networks
According to a report published by Kaspersky Lab ICS CERT, RATs are incredibly widespread across all industries.
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
2018 proves to be a mixed bag of severe cyber threats, report finds
There are more than 100,000 known vulnerabilities that are open to exploitation from attackers.
ESET cautions mobile gamers to check their games are safe
Whether on iOS or Android, downloadable games inevitably come with more security risks.
Exclusive: How companies can stay secure in the cloud
"Organisations moving to the cloud must defend against malware that can infect a business by spreading through personal and corporate devices."
Botnet activity spreading multi-purpose malware tools
Cybercriminals who use botnets to conduct their attacks are shifting away from single-purpose malware .
Cryptomining and IoT attacks gunning for healthcare industry
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.