Aug 30, 2019 | Cloud Consultancy News
There’s a mobile application for everything nowadays and platforms for arranging threesomes and hookups are no exception — but when security fails users, personal lives and careers may be at risk — a problem highlighted by a data leak discovered in...
Aug 29, 2019 | Cloud Consultancy News
Attackers accessed customers’ Oyster accounts using a list of stolen usernames and passwords obtained from other sources. TFL suspended online Oyster card accounts and has implemented additional security measures to prevent further intrusion. What is the issue?...
Aug 28, 2019 | Cloud Consultancy News
Air New Zealand suffered a data breach compromising Airpoints members’ personal information after two staffs had their accounts breached in a phishing attack. The incident has affected nearly 3.5 percent of 3.2 million Air New Zealand Airpoints customers, which is...
Aug 27, 2019 | Cloud Consultancy News
Password spraying, unlike traditional brute force attacks, often stays under the radar. Instead of targeting a single account with multiple password guesses, password spraying uses a high-probability password against multiple accounts. By avoiding rapid account...
Aug 26, 2019 | Cloud Consultancy News
Apple released new updates for iOS, watchOS, and the HomePod on 22nd July. The latest updates are stable releases for the operating systems and are available to the public instantly. The new iOS release, version 12.4, introduces a new migration feature for the iPhone....
Aug 23, 2019 | Cloud Consultancy News
Microsoft have announced that Skype for Business Online will be retired on July 31, 2021. This post provides details on the retirement plan, a brief explanation of why we’re making this announcement now, and a summary of what Microsoft are doing to help customers...
Aug 22, 2019 | Cloud Consultancy News
A new malware strain named Clipsa has been making the rounds for the past year, infecting users from all over the world. What stands out about this new threat is that besides classic malware features — such as the ability to steal cryptocurrency wallet files,...
Aug 21, 2019 | Cloud Consultancy News
Blog Author: Ed Bott The single most important security precaution you can take with high-value online accounts is to enable a mobile device as a secondary identity factor. Which authenticator app should you choose? The correct answer might involve multiple apps....
Aug 20, 2019 | Cloud Consultancy News
It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threatto a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This...
Aug 19, 2019 | Cloud Consultancy News
Samsung announced a lot of new things last night. But more importantly, it announced an expansion of its existing partnership with Microsoft. Both the companies have been working together for a while, with Samsung shipping some of Microsoft’s apps pre-installed on its...
Aug 16, 2019 | Cloud Consultancy News
The omnipresence of consumer electronics and computer power, alongside modern trends (i.e., DevOps, microservices, and open source) that accelerate deployment cycles continue to strain enterprises’ ability to detect and identify exploitable flaws in a timely manner....
Aug 15, 2019 | Cloud Consultancy News
peaking on “Testing Your Organization’s Social Media Awareness” at Black Hat USA, Jacob Wilkin, network penetration tester and application security consultant, Trustwave SpiderLabs, said that social media phishing is on the rise and is now the “preferred vector...
Aug 14, 2019 | Cloud Consultancy News
Malwarebytes today launched a malware removal service that makes first responders in the form of cybersecurity professionals available on-demand to organisations currently under cyberattack. Kevin Latimore, enterprise malware removal specialist for Malwarebytes, said...
Aug 13, 2019 | Cloud Consultancy News
The monetary value of PHI can be enormous. As a result, attackers are employing increasingly sophisticated techniques to gain access to patient health records. Healthcare organisations are aware of the extremely sensitive nature of patient data, and consequently the...
Aug 12, 2019 | Cloud Consultancy News
Microsoft Threat Intelligence Center attributed the attacks to the STRONTIUM APT group, also known as APT28 and Fancy Bear. The compromised IoT devices include VOIP phone, office printer, and video decoder. Microsoft security researchers have observed that a...
Aug 9, 2019 | Cloud Consultancy News
In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking attackers into overextending and exposing themselves. To deceive attackers, an organization’s...
Aug 8, 2019 | Cloud Consultancy News
A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, according to ConnectWise. The risk assessments reveal that an alarming 69% of SMBs have not...
Aug 7, 2019 | Cloud Consultancy News
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better security for their data and financial information. The research shows that they are right to be...
Aug 6, 2019 | Cloud Consultancy News
70 percent of organisations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely to moderately” vulnerable to them, according to Nucleus Cyber. Not only are organisations...
Aug 5, 2019 | Cloud Consultancy News
A new family of ransomware designed to attack Google’s Android mobile operating system utilizes SMS messaging to spread, researchers say. On Monday, cybersecurity professionals from ESET revealed their investigation into the new malware, dubbed...
Aug 2, 2019 | Cloud Consultancy News
Apple’s Siri records private and confidential conversations and activities on a regular basis including talk relating to medical conditions, drug deals, and sex acts. The Guardian reports that an unnamed whistleblower has brought the situation to light, in which...
Aug 1, 2019 | Cloud Consultancy News
The attackers behind this campaign are demanding a ransom between 0.01 and 0.05 bitcoins. The bitcoin address associated with this campaign has received a total of 9 payments since June 27, 2019. Attackers are deleting files on publicly accessible Lenovo Iomega NAS...