Nearly half a mill hit by four malignant Chrome Extensions

According to security researchers at US cyber firm ICEBRG have located four Chrome extensions which house malevolent code that were available through the official Chrome Web Store which allowed attackers to send commands through to users’ browsers in the JavaScript code form. View Full Story ORIGINAL SOURCE: Bleeping Computer The post Nearly half a mill hit by four malignant Chrome Extensions appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

January 16, 2018
Read More >>

Increased cloud adoption increases data security risk

In the latest Ponemon Institute “2018 Global Cloud Data Security Study”, results have shown that organisations in the UK (35%), Brazil (34%) and Japan (31%) are less cautious than those in Germany (61%) when sharing sensitive and confidential information stored in the cloud with third parties. View Full Story  ORIGINAL SOURCE: Helpnetsecurity The post Increased cloud adoption increases data security risk appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

January 16, 2018
Read More >>

RubyMiner malware used to mine Cryptocurrency from outdated Windows and Linux servers

News has surfaced that a new strain of malware called RubyMiner is being used by cyber criminals to target outdated Linux and Windows serves to secretly mine cryptocurrency. According to Check Point researchers, the criminal has been using RubyMiner to plant the cryptocurrency miner XMrig on vulnerable systems to hijack users’ CPU processing power and covertly mine Monero coins. The attacks are thought to have began from the 9th January,…

January 16, 2018
Read More >>

Watch out for the fake Meltdown and Spectre patches

It has been discovered that hackers have been distributing fake patches to deliver malicious malware called Smoke Loader. The so-called ‘patches’ have been masked as fixes for the Meltdown and Spectre vulnerabilities that is said to have affected nearly every modern CPU worldwide. View Full Story ORIGINAL SOURCE: IBTimes UK The post Watch out for the fake Meltdown and Spectre patches appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

January 16, 2018
Read More >>

Learning to live left of breach

The cybersecurity industry tends to focus its attention on what to do after a breach or a hack occurs. After all, this is the topic of discussion for the media, or an organisations’ partners and customers. “What does the victim do now?” But shouldn’t we at least be as interested, if not more so, in what the organisation should be doing before a breach ever occurs? This is how we’ve…

January 16, 2018
Read More >>

Can you decode puzzles set by GCHQ for cyber-savvy girls competition?

YOUNG girls from across the country will pit their codebreaking skills against one another in a series of head-scratching online challenges to crown the UK’s brightest cyber minds. Registration for the online phase of the 2018 CyberFirst Girls Competition, run by the National Cyber Security Centre (NCSC), part of GCHQ, opens today [Tuesday, 16 January]. NCSC and GCHQ experts have devised 100 challenges of varying difficulty for female pupils aged…

January 16, 2018
Read More >>

Digital Businesses Thwart a Record 700 Million Attacks on Consumer Transactions in 2017, Reveals New Cybercrime Report from ThreatMetrix

ThreatMetrix, The Digital Identity Company, today revealed that 2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks—as seen across its global network, which analyses 100 million transactions a day— the ThreatMetrix Cybercrime Report 2017: A Year in Review confirmed a 100 percent increase in volume of attacks over the last two years. The good news is that record numbers of these…

January 16, 2018
Read More >>

Getting the GDPR gremlin off your back

With less than nine months to go until Global Data Protection Regulations (GDPR) come into force across the European Union, businesses should be well underway in their efforts to achieve compliance. However, meeting the demands of GDPR is easier said than done and a substantial proportion of businesses are still showing a worrying lack of preparedness. According to a study released in July by Spiceworks, just five per cent of…

January 15, 2018
Read More >>

IoT DDoS Threats Loom in Hot New Tech

There’s a flood of connected devices making their way into our homes and businesses – a deluge exacerbated by recent holiday gifts and the latest and greatest from CES, where connected devices always take top billing.   From mobile, wearables and car technology to advancements in smart homes, TVs and cameras, the tech world is awash with internet-connected devices. By 2020, it’s estimated that there will be more than 30 billion…

January 15, 2018
Read More >>

Technology at the Edge: Axis’ top 5 trends to shape 2018

“As Greek philosopher Heraclitus said, “the only one constant in life is change.” There is perhaps no better example of this than the technology industry, where innovation is so rapid that even the most fantastic of imagined futures seem like they could become a reality in the not too distant future. As we enter 2018, Axis has put together five top technology trends that it feels will have a great…

January 15, 2018
Read More >>