Dec 24, 2018 | Cloud Consultancy News
Christmas is just around the corner and so – unfortunately – is probably a nasty attack of phishing, which brings us to how to protect against phishing. Jan Oetjen takes us phishing, but with the odd interruption. With each UK citizen spending an average of £330...
Dec 21, 2018 | Cloud Consultancy News
A study conducted by Ponemon Institute found that 60 percent of organisations globally had suffered two or more business-disrupting cyber events — defined as cyber attacks causing data breaches or significant disruption and downtime to business operations, plant and...
Dec 20, 2018 | Cloud Consultancy News
A phishing campaign has been discovered that pretends to be a non-delivery notification from Office 365 that leads you to a page attempting to steal your login credentails. This new campaign was discovered by ISC Handler Xavier Mertens and states that “Microsoft...
Dec 19, 2018 | Cloud Consultancy News
A recent phishing campaign targeting US government officials, activists and journalists is notable for using a technique that allowed the attackers to bypass two-factor authentication protections offered by services such as Gmail and Yahoo Mail, researchers said...
Dec 18, 2018 | Cloud Consultancy News
When you open a new tab in Chrome, there are several different ways you can configure what appears. You can have it show you frequently visited sites, news headlines, or maybe you prefer to keep things simple and leave it plain. But if you enjoy images, Chrome allows...
Dec 17, 2018 | Cloud Consultancy News
ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s PayPal address. The heist won’t go unnoticed by the victim if they are looking at the phone...
Dec 14, 2018 | Cloud Consultancy News
Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers saw it spread through several campaigns, including a Thanksgiving-themed campaign. This...
Dec 13, 2018 | Cloud Consultancy News
Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet security report. The Mac scareware appeared in sixth place in WatchGuard’s latest Q3 2018 report and is primarily delivered by...
Dec 12, 2018 | Cloud Consultancy News
Dell Technologies will become a public company again December 28. The company said it received shareholder approval to buy back a tracking stock that’s linked to its stake in VMware. In a nutshell, Dell will close the deal December 28 and its C shares will trade...
Dec 11, 2018 | Cloud Consultancy News
Businesses in the UK think the government should be more focused on helping them deal with cybersecurity issues. This is according to a new report from RedSeal, which says a sensitive political and business environment this year has deflected attention away from...
Dec 10, 2018 | Cloud Consultancy News
Source: CSO from IDG Author: Roger A. Grimes I’ve written about what I consider the best current password advice for websites and services you need to keep secure. In a nutshell, here’s the advice again: – Use multi-factor authentication (MFA). – Where MFA...
Dec 7, 2018 | Cloud Consultancy News
N network Two or more computers linked in order to share resources. P patching – Applying updates to firmware or software to improve security and/or enhance functionality. pentest – Short for penetration test. An authorised test of a computer network or...
Dec 6, 2018 | Cloud Consultancy News
H hacker – In mainstream use as being someone with some computer skills who uses them to break into computers, systems and networks. honeypot (honeynet) – Decoy system or network to attract potential attackers that helps limit access to actual systems by...
Dec 5, 2018 | Cloud Consultancy News
D data at rest – Describes data in persistent storage such as hard disks, removable media or backups. dictionary attack – A type of brute force attack in which the attacker uses known dictionary words, phrases or common passwords as their guesses. digital...
Dec 4, 2018 | Cloud Consultancy News
A Antivirus – Software that is designed to detect, stop and remove viruses and other kinds of malicious software. App – Short for Application, typically refers to a software program for a smartphone or tablet. Attacker – Malicious actor who seeks to...
Dec 3, 2018 | Cloud Consultancy News
Almost a quarter of UK and German businesses (23%) believe the GDPR may have resulted in a greater risk of data breaches, six months after the legislation was introduced. The findings come from a new survey by Thales eSecurity which polled 1000 combined UK and German...