TelcoNews Asia - Telecommunications news for ICT decision-makers

Cyber attacks stories - Page 106

Screen shot 2017 06 21 at 12

The malware that brought down Ukraine – is it really that sophisticated?

Wed, 21st Jun 2017
#
malware
#
cybersecurity
#
hackers
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Thinkstockphotos 696920092

Kaseya launches new two-factor security platform for MSPs

Tue, 20th Jun 2017
#
mfa
#
it automation
#
iam
Kaseya has launched a new custom-built security platform for MSPs, built in part due to increasing cyber attacks from APT10.
Thinkstockphotos 585162630

Rackspace presents five ways to reduce your ransomware risk

Tue, 20th Jun 2017
#
malware
#
ransomware
#
encryption
Rackspace reveals key strategies to combat ransomware, emphasizing robust backups and vigilant patch management.
Thinkstockphotos 694845322

Three key security hotspots to consider for your 2018 budget

Mon, 19th Jun 2017
#
malware
#
firewalls
#
network infrastructure
When budgeting for the 2018 financial year, businesses should look to strengthen cybersecurity defenses in policies, infrastructure & training.
Thinkstockphotos 485228749

Meeting the challenges of big data in the modern data centre

Tue, 6th Jun 2017
#
data analytics
#
hyperscale
#
martech
We're in the midst of a communications revolution where enterprise data centre networks must keep pace with ever increasing capacity demands.
Thinkstockphotos 691573222

Security - It really is all or nothing if you want to know the enemy

Tue, 6th Jun 2017
#
ddos
#
supply chain
#
cybersecurity
Cybersecurity spending is set to reach $90bn in 2017 as businesses shift focus to detection and response capabilities.
Thinkstockphotos 531478286 xyyzfqx

Does your healthcare organisation need a security health check?

Thu, 1st Jun 2017
#
malware
#
firewalls
#
network infrastructure
In the rush to move healthcare records to the cloud, there's often an assumption that security comes automatically.
Money flowing from tap

Cost of cybercrime for businesses to surpass $8 trillion over next five years

Thu, 1st Jun 2017
#
malware
#
ransomware
#
cybersecurity
New insights from Juniper Research have predicted a rather dire future for modern businesses in the constant war against cybercrime.
Thinkstockphotos 528497380

Hackers are able to target your e-cigarette... Is nothing sacred?

Mon, 29th May 2017
#
cybersecurity
#
hackers
#
usb
Vaping can be risky in unexpected ways as a security researcher demonstrates how a modified vaporizer can pass code to a computer.
Thinkstockphotos 461154751

Fortune 500 companies in Japan, China & South Korea most vulnerable to attacks

Wed, 17th May 2017
#
uc
#
healthtech
#
blackrock
Fortune 500 firms in Japan, China, and South Korea are highly susceptible to cyber attacks, according to KomodoSec's Peta.AI Cybersecurity Exposure Site.
Thinkstockphotos 589576914

Pirates of the Caribbean film held ransom by, well.. pirates

Tue, 16th May 2017
#
malware
#
ransomware
#
crypto
The hackers have demanded an enormous undisclosed amount of money be paid in Bitcoin. Disney apparently refuses to pay, and is working with the FBI.
Cyber attack

Cyber attacks on govt double; IoT becomes threat and source of attack

Wed, 10th May 2017
#
malware
#
ransomware
#
cybersecurity
Cyberattacks on govt doubled last year, tying the sector with finance as the most targeted market, while IoT is becoming both a source - and a target.
Thinkstockphotos 680501782

LogRhythm launches partner program alongside security's biggest brands

Tue, 9th May 2017
#
siem
#
socs
#
partner programmes
LogRhythm has launched a Technology Alliance Partner Program and signed up the likes of Carbon Black, Cisco and Palo Alto Networks.
Thinkstockphotos 483978146

Spoiler alert: Hackers leak unreleased Netflix series

Mon, 1st May 2017
#
digital entertainment
#
cybersecurity
#
netflix
An unidentified hacker has released the highly anticipated Season 5 episodes of popular Netflix show Orange is the New Black.
Cybercriminial

Cybercriminals use verified API token to generate Facebook spam comments

Fri, 28th Apr 2017
#
api
#
cybersecurity
#
facebook
In exchange for more 'likes' and comments on their own timelines, users are enticed to provide the app's access token to a third-party website.
Thinkstockphotos 492021523

LogRhythm report casts damning eye on enterprise security tactics

Wed, 26th Apr 2017
#
siem
#
breach prevention
#
cybersecurity
LogRhythm's latest cyber resiliency report casts a damning look into the state of Asia Pacific organisations in Asia Pacific.
Thinkstockphotos 546771164

Brennan IT's five tips to better your cybersecurity strategy

Mon, 10th Apr 2017
#
martech
#
commerce systems
#
breach prevention
So it's all very well to understand cyber risks, but how do you put security measures in place? Brennan IT suggests five tips to better security.
Thinkstockphotos 134540054

Global security heavyweights win big at SANS Best of Awards

Thu, 30th Mar 2017
#
storage
#
cybersecurity
#
cyber attacks
CrowdStrike, Carbon Black, Palo Alto Networks, FireEye, Cylance and LogRhythm were among the winners at the SANS Best of Awards this week.
Dcs 2017 2 sqligalleryfullscreenimage

NEC joins forces with INTERPOL to conduct digital security challenge

Mon, 27th Mar 2017
#
malware
#
ransomware
#
digital signage
NEC is keeping up its cybersecurity game, this time alongside INTERPOL as part of the Digital Security Challenge training held in Singapore.
Thinkstockphotos 486791090

The economics of cybersecurity for the undecided

Mon, 27th Mar 2017
#
malware
#
ddos
#
phishing
It is precisely because of this concept of the cost of doing nothing that we're able to determine the value of a cybersecurity solution.