Cyber attacks are becoming the No. 1 risk to business, brands, operations and financials, according to the SonicWall “2018 Cyber Threat Report.” SonicWall has recorded 9.32 billion malware attacks in 2017, an 18.4 percent year-over-year increase from 2016, and saw more than 12,500 new Common Vulnerabilities and Exposures (CVE) reported for the year, according to the report. “The cyber arms race ...
Read More »Yearly Archives: 2018
Cloud Security – The Future of IDS?
I’ve been a car audio enthusiast my whole life. I remember my first car stereo system, a Pioneer receiver, JL Audio subwoofers, Rockford Fosgate amps, Alpine speakers, and a sweet Viper car alarm system to protect it all. In the 1990s, I wasn’t the only one; people started putting expensive systems into their cars, and the rate of car theft ...
Read More »Expedia’s Orbitz Says 880,000 Payment Cards Compromised in Security Breach
Chicago-based online travel booking company Orbitz, a subsidiary of Expedia, reveals that one of its old websites has been hacked, exposing nearly 880,000 payment card numbers of the people who made purchases online. The data breach incident, which was detected earlier this month, likely took place somewhere between October 2016 and December 2017, potentially exposing customers’ information to hackers. According ...
Read More »ACCELERATE 2018 – A MILESTONE FOR FORTINET
Accelerate 18 began with a series of keynotes to a capacity crowd of Fortinet partners, sales people, and for the first time, customers. Beyond the expected executive addresses and other talks and workshops, Fortinet announced the evolution of our Security Fabric architecture – and more importantly – demonstrated how Fortinet is uniquely positioned in the industry to deliver the next generation of network ...
Read More »Pre-Installed Malware Found On 5 Million Popular Android Phones
Security researchers have discovered a massive continuously growing malware campaign that has already infected nearly 5 million mobile devices worldwide. Dubbed RottenSys, the malware that disguised as a ‘System Wi-Fi service’ app came pre-installed on millions of brand new smartphones manufactured by Honor, Huawei, Xiaomi, OPPO, Vivo, Samsung and GIONEE—added somewhere along the supply chain. All these affected devices were shipped ...
Read More »Warning – 3 Popular VPN Services Are Leaking Your IP Address
Researchers found critical vulnerabilities in three popular VPN services that could leak users’ real IP addresses and other sensitive data. VPN, or Virtual Private Network, is a great way to protect your daily online activities that work by encrypting your data and boosting security, as well as useful to obscure your actual IP address. While some choose VPN services for online ...
Read More »The Shift in Security Operations in a Multi-Cloud World
As cybersecurity continues to become more complex and harder to manage, the role of security operations for organizations is also shifting across the board. Long gone are the days where firewalls or intrusion detection systems (IDS) could keep adversaries outside the perimeter. Instead, we are seeing increases in both size and frequency of attacks leading to more pronounced impacts to ...
Read More »‘Kill Switch’ to Mitigate Memcached DDoS Attacks — Flush ‘Em All
Security researchers have discovered a “kill switch” that could help companies protect their websites under massive DDoS attack launched using vulnerable Memcached servers. Massive Memcached reflection DDoS attacks with an unprecedented amplification factor of 50,000 recently resulted in some of the largest DDoS attacks in history. To make matter even worse, someone released proof-of-concept (PoC) exploit code for Memcached amplification attack yesterday, making it easier ...
Read More »Best Practices: Deploying an Effective Firewall
In early August, malware infiltrated the computer network and systems of a transmission plant in North Carolina. It was a potentially costly attack, as the factory stood to lose $270,000 for every hour that it wasn’t manufacturing and shipping its automotive parts to plants across the U.S. Fortunately, the facility had a firewall standing between the factory’s crown jewels and hackers, blocking the malware ...
Read More »Best business firewalls: Which firewall is suitable for your business?
Best business firewalls: Which firewall is suitable for your business? There are countless options to choose from when considering firewall protection. Should you invest in an external firewall, stick with a virtual firewall or take the plunge with both? The firewalls listed here cater to most sizes of organisation, from small businesses that only require virtual firewalls to larger enterprises ...
Read More »