Month: June 2017

  • Acronis Updates Backup Platform to Accommodate Multiple Hypervisors

    Acronis Backup 12.5, available in both Standard and Advanced versions, has new functionality that supports more than 20 platforms. Read full news article on eWeek  

  • Software vulnerabilities used to spread WannaCry are favorites for hackers, FireEye says

    The same Microsoft Windows’ software vulnerabilities that allowed the WannaCry ransomware to spread globally are now being used by a wide array of hackers to infect computers with remote access trojans, according to new research by U.S. cybersecurity firm FireEye. Read full news article on Cyberscoop  

  • ‘Rime’ Piracy Challenge Obviously Defeated Immediately, Devs Remove DRM From Game

    The traditional piracy narrative goes like this: The PC version of a game has some form of DRM Pirates crack it almost immediately Sometimes, the narrative goes like this: Read full news article on Forbes.com  

  • How to conduct a production outage post-mortem

    Working in IT has many benefits; plenty of employment opportunities, interesting and challenging work and the ability to get involved with a lot of cool technology. The flip side can be long nights, maddening problems, and – probably dreaded most of all by every IT pro – a production outage, where critical systems or services…

  • OneLogin Password Manager Breach Enabled by Stolen AWS Cloud Keys

    NEW ANALYSIS: Online password manager service suffers a data breach after an attacker is able to get access to the company’s cloud services. Read full news article on eWeek  

  • Most Orgs Mount Ineffective Security Investigations

    Firms experience an average of 40 actionable incidents per week, but only a quarter (27%) think they are coping comfortably with this workload, and a third (33%) describe themselves as “struggling” or “constantly firefighting.” The volume of incidents is clearly challenging, and for some industries more than others: The average number of actionable security alerts…

  • Hack Brief: Dangerous ‘Fireball’ Adware Infects a Quarter Billion PCs

    ADWARE THAT INFECTS your computer to display pop-ups is an annoyance. But when it infects as many as one five networks in the world, and hides the capability to do far more serious damage to its victims, it’s an epidemic waiting to happen. The security firm Check Point has warned of a massive new outbreak:…

  • Google Increases Maximum Android Bug Bounties to $200,000

    The versions of Android being released now are vastly more secure than what Google was putting out years ago. In fact, no one has managed to claim Google’s largest bug bounties for Android. Read full news article on Extreme Tech  

  • Cosmetic Surgery Clinic’s Photos Released in Cyber Blackmail Attack

    A group of hackers released more than 25,000 photos and sensitive patient data from a Lithuanian cosmetic surgery clinic, following a blackmail scheme in which attackers demanded nearly $800,000 in payment, according to a report in The Guardian. After the blackmail attempt with the clinic Grozio Chirurgija failed earlier this year, the attackers, who go…

  • Cisco and IBM team up to boost their security products

    Cisco and IBM have announced a new partnership that will see both companies integrate their security services, products and threat intelligence in an effort to bolster their cybersecurity offerings. Both companies already have sizable security businesses and the partnership will see them share research and services with one another. Cisco’s security suite will integrate with IBM’s…

  • Protecting Today’s Financial Services Industry in a Digital Environment

    Consumers around the world across a variety of industries are adopting digital technologies to improve their daily lives, and they expect organizations to support this behavior. In the financial services sector, they’re using technologies like digital banking and insurance apps for tasks that used to be completed offline. Read full news article on Fortinet Blog…

  • It’s About Time: Where Attackers Have the Upper Hand

    The median timeframe between attacker compromise and victim detection is 38 days. This “attacker dwell time” Read full news article on dark READING