The Key to Minimizing POS Breaches
agosto 24, 2016
More commonly, hotels are reporting that point-of-sale (POS) systems are being compromised by malware. In July, Omni Hotels & Resorts issued a statement that POS systems had been breached, while just this month, HEI Hotels & Resorts announced it was investigating a POS hack that affected Hyatt, Marriott, and Starwood properties. In both cases, the […]
What You Need to Know about the Evolution of DDoS
agosto 15, 2016
In an attempt to define the modern-day DDoS attack, one must understand – there is more than one type of attack. Starting with the simplest first, network level DDoS attacks are the easiest to launch. They are fundamentally designed to crush networks and melt down firewalls. Aimed at filling state tables and consuming the available […]
Data related to major sporting events vulnerable to hacking
julho 11, 2016
Some major sporting events and tournaments are scheduled to take place this year making these events and sensitive data related to the teams participating vulnerable to hacking, according to cyber security researchers. The recent dependency of sport teams, organisations and tournament hosts on mobile, cloud and analytics, make them easy targets for hackers.
Unsung cybersecurity vulnerabilities in US infrastructure and utilities
julho 8, 2016
This past May, the Internet was abuzz about a report by the Government Accountability Office (GAO) highlighting a number of outdated “legacy systems” still in use across the U.S. government. According to the report, “The Strategic Automated Command and Control System coordinates the operational functions of the United States’ nuclear forces, such as intercontinental ballistic […]
Wendy’s: Credit card numbers disclosed in cyber attack
julho 7, 2016
Fast-food chain Wendy’s said Thursday that customers’ personal information was compromised in a series of cyber attacks that started last year. Wendy’s, which has been investigating “unusual payment-card activity” since early this year, said that cardholder names, credit or debit card numbers and expiration dates are among data targeted in an attack on a point-of-sale […]
The Fully Aware, Hybrid-Cloud Approach
julho 6, 2016
For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy. Are they […]
Liar, liar, email on fire: the security value of lie detecting algorithms
junho 30, 2016
Researchers have developed a method of identifying linguistic clues in electronic communications that could point to possible cases of deception. Could lie-detecting algorithms reduce the impact of phishing emails?
NSFOCUS Wins 2016 Information Management Award
junho 27, 2016
NSFOCUS Wins 2016 Information Management Award NetworkWorld Asia Names NSFOCUS Solution “The Most Promising Cyber Security Solution” Santa Clara, Ca. June 28, 2016 – NSFOCUS, a global network and application security provider, today announced that it has received top honors in the NetworkWorld Asia 2016 Information Management Award for the most promising cyber security solution […]
Stare Into the Dark Side of DDoS Attacks
junho 26, 2016
For more than a decade, attackers have used distributed denial of service attacks to disrupt their victims’ operations, often taking organizations completely offline. The motivations behind these attacks include notoriety, competitive advantage, cyber warfare, terrorism, hacktivism and/or extortion. Bandwidth- or resource-saturating DDoS attacks are effective, but today they are not the most common type of […]
Godless Android malware offers serious firepower to a botnet herder
junho 24, 2016
One of the most concerning characteristics of the Godless malware is the ability to receive remote instructions on which app to download and install on mobile devices, without the user’s knowledge. This is called command and control (C&C). Being a DDoS subject matter expert, I believe this has the makings of something more insidious than […]