• Most-popular websites use ‘keylogger-as-a-service’ for analytics, researchers find

    Nov 24, 2017, 08:55 AM by Ben Gane
    Third-party scripts on hundreds of popular websites have been extracting personal information from visitors in “increasingly intrusive ways,” according to researchers at Princeton University.
    Full story
  • 7 Essential Real-World Security Questions to Ask Today (Pt. 2 of 2)

    Nov 24, 2017, 08:53 AM by Ben Gane
    Question 5: Do we have a consistent process for adding new applications (including cloud/SaaS) to our whitelist as demanded by the business — and applying the appropriate policies to them?...
    Full story
  • Android phones collect location data when GPS is off, send it to Google

    Nov 24, 2017, 08:52 AM by Ben Gane
    Android phones have been collecting user data even when the GPS function is turned off, Google confirmed following an investigation by Quartz Media. Starting this year, Android phones have accessed data on users’ locations...
    Full story
  • Can network operations and security operations be friends?

    Nov 24, 2017, 08:49 AM by Ben Gane
    Despite advances in cybersecurity and application performance management, today’s enterprises continue to be challenged with achieving full visibility into the network interdependencies, preventing effective performance triage and threat mitigation. For example, in the latest SANS survey...
    Full story
  • Massive email campaign spreads Scarab ransomware

    Nov 24, 2017, 08:47 AM by Ben Gane
    In a similar fashion to the Jaff ransomware, Forcepoint Security Labs have observed another piece of ransomware called “Scarab” being pushed by the infamous Necurs botnet. The massive email campaign started at approximately 07:30 UTC and is active as of 13:30 today, totalling over 12.5...
    Full story
  • 7 Essential Real-World Security Questions to Ask Today (Pt. 1 of 2)

    Nov 24, 2017, 08:45 AM by Ben Gane
    Every company needs to be secure. And there are lots of security technologies that help address this goal. In the real world, however, security has a context. And that context is a business or organization that’s pursuing goals...
    Full story
  • Uber Chief Security Officer fired after massive data-breach cover up

    Nov 23, 2017, 10:26 AM by Ben Gane
    Uber Chief Security Office Joe Sullivan and the lawyer reporting to him were fired after paying hackers $100,000 to cover up a massive data breach from October 2016, the company’s CEO confirmed on Tuesday, Bloomberg writes. The ride-service provider was hacked after two cyber criminals...
    Full story
  • Uber: How Not To Handle A Breach

    Nov 23, 2017, 09:07 AM by Ben Gane
    Uber is a company that is embattled on all fronts. From a very public power struggle to labour issues to regulatory challenges to a reportedly toxic culture, Uber sits in a precarious position...
    Full story
  • Reflections of Dreamforce

    Nov 23, 2017, 08:56 AM by Ben Gane
    Earlier this month, invited Forcepoint to present a session and participate in a panel at their annual Dreamforce conference in San Francisco. The theme of the event was “Be a Trailblazer,” which resonated for me as a technologist. Throughout the conference there was a resounding...
    Full story
  • Is DraaS Right for You?

    Nov 23, 2017, 08:54 AM by Ben Gane
    If you associate disaster recovery with stress and chaos, you’ve probably wanted to hand it all off to someone else at some point. Disaster Recovery as a Service (DRaaS) can sound pretty appealing that way – experts step in with advanced technology and deep BDR experience to...
    Full story
  • Report Says 1.9 Billion Data Records Were Compromised During First-Half 2017 Breaches

    Nov 20, 2017, 09:59 AM by Ben Gane
    What were the biggest cyber security culprits in the first half of 2017 from a data breach standpoint? Identity theft and poor internal security practices, according to the latest Breach Level Index (BLI) Report by Gemalto...
    Full story
  • Helping to Secure your PostgreSQL Database

    Nov 20, 2017, 08:49 AM by Ben Gane
    When big high-tech companies like Apple, Red Hat and Cisco use PostgreSQL in their data infrastructure, you can be certain that PostgreSQL ranks up there with the bigger relational database managers. PostgreSQL is an enterprise-level open source database that has been in production...
    Full story
  • New EMOTET Hijacks a Windows API, Evades Sandbox and Analysis

    Nov 20, 2017, 08:42 AM by Ben Gane
    We discussed the re-emergence of banking malware EMOTET in September and how it has adopted a wider scope since it wasn’t picky about the industries it attacks. We recently discovered that EMOTET has a new iteration (detected as TSPY_EMOTET.SMD10) with a few changes...
    Full story
  • Visa debit card converts cryptocurrency to pounds for payments across UK

    Nov 17, 2017, 13:00 PM by Ben Gane
    Paying for your groceries or a doctor’s visit with bitcoin by card is closer than you think. A recently launched British cryptocurrency exchange website, London Block Exchange (LBX), announced plans to launch in a few weeks a card in partnership with Visa that will allow cryptocurrency...
    Full story
  • Pursuing The Right to be Left Alone

    Nov 17, 2017, 09:07 AM by Ben Gane
    The three pillars of privacy, defined in “The Right to Privacy” (4 Harvard L.R. 193 (Dec 15, 1890)), are 1) the right to know what information is gathered about you, 2) the right to know how it will be used, and 3) the right to be left alone. The European Union has incorporated these principles into...
    Full story
  • Skype fined €30,000 for not giving user data to Belgian authorities in criminal investigation

    Nov 17, 2017, 08:57 AM by Ben Gane
    Skype lost a legal appeal in Antwerp, Belgium, on Nov. 15, and now has to pay the fine of €30,000 for not supplying Belgian authorities with information requested in an investigation dating from 2012, writes Reuters...
    Full story
  • Start anywhere: human-centric cybersecurity for today's zero perimeter world

    Nov 17, 2017, 08:51 AM by Ben Gane
    It’s time to rethink cybersecurity. Today Forcepoint is pleased to announce a different approach to a critical question being asked by today’s organizations: how do you protect your people (wherever they choose to do their work) and your data (wherever it resides), without frustrating...
    Full story
  • Terdot: Zeus-based malware strikes back with a blast from the past

    Nov 17, 2017, 08:34 AM by Ben Gane
    Malware authors are surely known for their ability to fly under the radar. But every once in a while, details about their operations surface on the web. This is the case of a handful of malware operations that managed to gain unwanted attention by having their source code leaked. Mirai, KINS,...
    Full story
  • What is your security's org chart?

    Nov 16, 2017, 08:42 AM by Ben Gane
    When viewed as a network schematic, most architectures appear relatively straightforward. But don’t be deceived by this simplicity. Scale, availability and security are at a constant tug of war. It’s getting more difficult to separate business processes from network infrastructure; the network...
    Full story
  • How To Budget For Cyber Security in 2018

    Nov 16, 2017, 08:40 AM by Ben Gane
    As Q4 begins in earnest, now is the time to start making considerations for next year's budgets. This is especially true for the company's IT and cyber security budgets – a difficult decision with so many robust technologies and new threats emerging...
    Full story
to Top