Vulnerabilities in mobile networks opens bitcoin wallets to hackers

Vulnerabilities in mobile networks opens bitcoin wallets to hackers Positive Technologies shows how hackers can gain access to bitcoin wallets using architecture flaws in SS7 Cryptocurrencies offer unprecedented transaction speeds and remittance security, but this is compromised by the weak security of digital wallets storing them. Positive Technologies has demonstrated an attack on a user account of Coinbase — one of the largest bitcoin exchanges in the world, which manages…

September 19, 2017
Read More >>

An (un)documented Feature: Attackers Abuse Office Document Software to Profile Potential Victims for Targeted Attacks

Kaspersky Lab experts have discovered a feature in popular document-creation software that has been abused by attackers to launch successful targeted attacks. Using a malicious application that activates when the simple office document is opened, information about the software installed on the victim’s device is sent automatically to the attackers, with no user interaction required. This data allows attackers to understand what type of exploit they should use in order…

September 19, 2017
Read More >>

UK education system exacerbating cyber skills gap as almost three quarters of British adults let down on digital skills at school

The latest research from McAfee reveals that British school education has played a major role in today’s cyber skills gap – leaving adults without sufficient IT skills and little to no insight into careers in cyber security.   Classroom inspiration In a survey of 2,000 UK-based respondents, McAfee found a clear link between school IT lessons and interest in cyber security roles. More than one in five (21%) British adults…

September 19, 2017
Read More >>

Equifax Suffered Breach Months Before Massive Attack

Equifax have reported they suffered another breach in March, months before the huge breach that was reported publicly in September,. View Full Story  ORIGINAL SOURCE: IB Times The post Equifax Suffered Breach Months Before Massive Attack appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

September 19, 2017
Read More >>

Locky Ransomware Variant Discovered

Stormshield have discovered a new Locky Ransomware variant.   Read Full Story  ORIGINAL SOURCE: Bleeping Computer The post Locky Ransomware Variant Discovered appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

September 19, 2017
Read More >>

Avast Speaks out Following CCLeaner Malware Incident

Avast has spoken out to clarify details surrounding the CCleaner Malware Incident   View Full Story  ORIGINAL SOURCE: Bleeping Computer The post Avast Speaks out Following CCLeaner Malware Incident appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

September 19, 2017
Read More >>

Who is the Most Dangerous Celebrity to Search Online?

Craig David is apparently the most dangerous celebrity to search online in the UK- searching for him is more likely to result in you ending up on a malicious site!   Read Full Story  ORIGINAL SOURCE: BBC.co.uk The post Who is the Most Dangerous Celebrity to Search Online? appeared first on IT SECURITY GURU. Source: http://www.itsecurityguru.org

September 19, 2017
Read More >>

Retailers experience two cyber attacks every week

Retailers are responding to cyber attacks on average twice a week — this is according to the latest research from Zynstra, an enterprise-grade IT software provider. 16% of retailers said they experienced an attack or attempted attack every day, 11% said they responded 2-3 times per week, and 64% said once a month. The incidence of cyber attacks was found to be especially high in the grocery industry with 29%…

September 18, 2017
Read More >>

Tackling third party threats

In today’s business environment, it’s not uncommon for organisations to outsource some or all of their IT capabilities to third-party contractors. It’s true that there are many benefits to this, outsourcing can save money that organisations would usually spend on full-time employees, so it’s no wonder this practice is so widespread. However, they are often overlooked as a potential threat, despite being granted access to a large proportion of their…

September 18, 2017
Read More >>