Cybercriminals are increasingly launching attacks focussed on obtaining cryptocurrencies. The recent rapid rise in value of cryptocurrencies such as Bitcoin and Ethereum has not only led scores of people to invest in digital currencies but also altered the threat landscape

A hacker who was arrested and pleaded guilty last year—not because he hacked someone, but for creating and selling a remote access trojan that helped cyber criminals—has finally been sentenced to serve almost three years in prison. Taylor Huddleston, 26,

Multiple customers of JP Morgan Chase reported unusual activities in bank account login due to internal glitch and it shows another persons account information when the user logged in their own account. JPMorgan Chase & Co. is a leading global

ISO 27001

What is the ISO 27001 standard? The ISO 27001 standard adopts a process approach for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an organisation’s information security management system. ISO 27001 was established by the International Organization for Standardization (ISO).

Password management service 1Password has a neat new feature that lets users check whether a password they’re thinking of using has already been breached. At which point it will suggest they pick another. This is in addition to the more

Hackers are using SSH brute-force attacks to take over Linux systems secured with weak passwords and are deploying a backdoor named Chaos. Attacks with this malware have been spotted since June, last year. They have been recently documented and broken

In May 2017, the Saudi Arabian Monetary Authority released its Cyber Security Framework to guide organizations in the region on how to best deal with cyber security threats. The adoption and implementation of the Framework is a vital step for

Information Security Regulation (ISR) standards from Dubai Smart Government mandates government entities in Dubai to implement requirements and controls stated in the standard to ensure appropriate level of confidentiality, integrity, and availability of information assets. By complying with ISR standard,

ADWARE THAT INFECTS your computer to display pop-ups is an annoyance. But when it infects as many as one in five networks in the world, and hides the capability to do far more serious damage to its victims, it’s an

Researchers are warning users about the Coldroot remote access Trojan that is going undetected by AV engines and targets MacOS computers. The RAT is cross-platform and capable of planting a keylogger on MacOS systems prior to the OS High Sierra

OVER THE PAST year, two digital disasters have rocked the internet. The botnet known as Mirai knocked a swath of major sites off the web last September, including Spotify, Reddit, and The New York Times. And over the past week,

Thousands of documents from US and international citizens were exposed on an Amazon S3 bucket configured for public access. Data belonging to thousands of global FedEx customers was exposed on an unsecured Amazon Simple Storage Service (S3) server configured for

Goa 2018, India Training: 27th Feb – 1st March Conference: 2nd March – 3rd March Events Speakers Interact with globally renowned security researchers, hear them share their experience and expertise Training Get hands-on technical training on various security topics Exhibition

Two Russian Nationals were given US federal prison sentences for their respective roles in a 2013 data breach which compromised 160 million credit card numbers and resulted in hundreds of millions of dollars in losses. Vladimir Drinkman, 37, and Dmitriy

Any individual or company is at risk of a cyber-attack and without the right protection in place, any computer or device can be vulnerable to security violations – particularly as those levelling the threats use new technology to enhance their

Last year saw a new wave of high-profile data breaches that reminded us that no industry is safe. The number and magnitude of incidents indicate that there is a disconnect between the nearly $90 billion that organizations spent on data