BrandPost: To Err Is Human: Solving Today’s Real Cyber Security Challenge

An employee receives an email consisting of a brief, compelling call to action — something like “Was this what you were talking about?” Recognizing a coworker’s name in the “from” line, the employee clicks on a link without a second thought … and heads straight to a phishing site designed by hackers to gather sensitive information. Because of this scenario and similar cyber attacks, many of today’s most difficult security…

January 16, 2018
Read More >>

BrandPost: Target Acquired: How to Face Growing Cyber Attacks Aimed at the Healthcare Industry

The stats on healthcare security are sobering. The Identity Threat Resource Center (ITRC) reports 30% of all U.S. data breaches are aimed at healthcare targets. McAfee Labs pegs the number at 26%, making it the most impacted North American sector in the second quarter of 2017. Another study — the Protenus Breach Barometer Mid Year Review — found that between January and June, more than 3.15 million patient records were…

January 16, 2018
Read More >>

Seven Ransomware Predictions for 2018

It might surprise you to know that most ransomware victims choose to pay a ransom to have their data restored. As long as victims continue to pay up, ransomware will continue to be a go-to strategy for cybercriminals. Furthermore, Forrester Research predicts that cybercriminals will increasingly use ransomware in 2018 to monetise attacks, as end-to-end encryption in payment systems often prevents them from stealing credit card data. In 2018, ransomware…

January 9, 2018
Read More >>

Hackers adopt ‘school of fish’ approach as they sharpen focus on mid-sized businesses

Rudimentary attacks, like information gathering, reputation blocks, fraud, and brute force attacks, increased by 71% from 2016-2017, according to new data released by eSentire, Inc., the largest pure-play Managed Detection and Response (MDR) provider. The data represents a total volume rise in detected events from 15 million in 2016, to 21 million last year. Reports demonstrate a marked technique shift by attackers who favor obfuscation techniques that evade standard perimeter…

January 9, 2018
Read More >>

Apple DOES Slow Older iPhones

Following years of rumours, Apple has confirmed it DOES slow older iPhones! View Full Story ORIGINAL SOURCE: The Guardian The post Apple DOES Slow Older iPhones appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

December 22, 2017
Read More >>

Bitcoin Crashes

Bitcoin value has crashed by 30% just days after reaching an all time high. View Full Story ORIGINAL SOURCE: The Telegraph The post Bitcoin Crashes appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

December 22, 2017
Read More >>

Alert Logic announces results of cybersecurity professionals survey as they celebrate their 3-year anniversary in Cardiff

Alert Logic, a leading voice in the cybersecurity industry providing security-as-a-service solutions for the cloud has found that security professionals are most concerned about the development of advanced threats, in a survey conducted to understand where the industry sees cyber threats moving in 2018. According to the results, conducted with 400 cybersecurity professionals, 62% cited the detection advanced threats as the most pressing issue facing them as we look towards…

December 20, 2017
Read More >>

Diversity and competency are not mutually exclusive

My editor sent me a link to this cybersecurity podcast-slash-radio show, Task Force 7 Radio, because they’ve been talking about the talent shortage within cybersecurity and especially the shortage of women and people of color.  At approximately 19 minutes in, the host, George Rettus, reads a listener comment about a previous week’s show, which said something along the lines of, “I’m all for diversity, and it’s important, but we can’t…

December 15, 2017
Read More >>

Threat Hunting Professional (THP) Launch Offers

December 12, 2017

Hunting season is now open, as today we announce the release of another brand-new training course: Threat Hunting Professional. For those geared and ready for THP, we’ve got some exciting deals locked and loaded for you this December! Use the code THP-D4A upon enrollment and you’ll be getting 30% off regular course fees, as well as a free Edition upgrade. Regular course fees: $1299 Regular course fees: $1499 The hunted…

Read More >>

India Tells Troops to Delete Chinese Apps Amidst Hacking Fear

The Indian defence ministry has advised troop stationed on the Chinese border to delete Chinese apps from their phone, amidst hacking fears. Read Full Story  ORIGINAL SOURCE: Bleeping Computer The post India Tells Troops to Delete Chinese Apps Amidst Hacking Fear appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

December 11, 2017
Read More >>