Gangs of cyber criminals, organising themselves along the lines of drug cartels, are changing the ‘rules’ of ransomware attacks to keep ahead of the authorities’ efforts to thwart their activities. That’s the conclusion of a new report by leading cyber analytics expert CyberCube.
Fortinet’s Derek Manky on the importance of threat intelligence to partner business
Organisations of all sizes are working to prioritise security initiatives as cyber threats become more targeted and sophisticated. Aware of …
Evolve 2019: How strong is your cybersecurity strategy?
Despite the global rise in Ransomware and malware, a recent report showed that 91 percent of assessed UAE-based organizations had …
Structured thinking to combat cyber criminals
Marc Kassis, Cyber Security Division Director, META, Ingram Micro on how end-users must adopt different solution thinking to combat cyber …
Cybercriminals use Google Cloud Messaging service to control malware on Android devices
Kaspersky Lab researchers identified Android malware threats that receive commands from attackers through the Google Cloud Messaging service.
Hackers use royal baby news as social engineering lure
It may be old news now, but hackers are still using news of the royal baby’s birth to entice people into clicking on malicious links, according to researchers at Trend Micro.
Compromised websites at hosting companies more than doubling daily from a year ago, report finds
Cyber-criminals are compromising websites at hosting companies at an ever-furious rate.
Most BYOD businesses exposing data to cyber criminals
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies.
Most enterprise networks riddled with vulnerable Java installations, report says
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations.
New Android malware lowers the bar for cyber-criminals
The first tools for injecting legitimate Android apps with open-source software that allows an attacker to control an infected smartphone remotely have been found in the criminal underground.