Blog

It Usually Takes 205 Days Before a Company Detects a Security Breach

According to a recent report, it takes approximately seven months before a company recognizes that it’s been or being hacked. And that’s seven months too long. As reported before, the volume of security threats that organizations deal with regularly are enormous, and that number is more likely to increase than decrease in the future. Examples […]

Read more

Airport Security Networks Can Be Compromised With a Common Laptop

This is the alarming discovery of renowned security expert Billy Rios. He discovered that hackers could have the capability to shut down an airport’s security network just by using a laptop. And this is particularly dangerous, as criminals or terrorists may manipulate the system to conceal weapons from x-ray scanners or the like. What’s ironic […]

Read more

The Australian: The Number of Online Security Attacks Have Tripled in the Last 3 Years

The threat of security breaches has risen to alarming levels and is expected to cost more than $1 billion, according to a report by The Australian. Moreover, the Australian Cyber Security Centre (ACSC) cautioned that such attacks have been unrelenting (which confirms the suspicions of a lot of IT managers today), noting that a 20% […]

Read more

Report: Nearly 50% of IT Managers Believe that They Are Targets of Weekly Security Attacks

About half of Australian IT managers believe their respective organisations are targeted by security attacks every week. More distressingly, one in eight of them  think that they had been attacked in the past minute—which supports the idea that attacks are non-stop. These are the findings of a survey conducted by Centrify, an identity management firm, […]

Read more

Check Point Takes a Look at the Malware Called Matsnu

Stanislav Skuratovich, a researcher at Check Point, recently set his sights on a malware called Matsnu, which is an x86 infector that serves as a backdoor after infiltrating a computer system. This malware is able to upload and execute any code—which could potentially encrypt files on disc or uncover sensitive data—on the infected system. The […]

Read more

Acunetix Can Help You Identify Sites that Host Malware

Identifying which sites are infected by malware or are used for phishing attacks shouldn’t be a problem with the Acunetix Vulnerability Scanner v10. If you’re running a website, Acunetix will detect the sites that you shouldn’t be linking to. This is valuable, as linking to compromised websites may affect your site’s SEO. Acunetix utilizes the […]

Read more

Surveillance Court Allows the NSA to Resume Its Bulk Data Collection

As per the ruling of the Foreign Intelligence Surveillance Court, the National Security Agency may temporarily resume its program—which was once hidden from the public eye—of systematically collecting bulk records of Americans’ domestic phone calls. Naturally, the American Civil Liberties Union said that it would raise the issue to the United States Court of Appeals […]

Read more

The Fight for Greater Online Privacy

Years after Edward Snowden exposed the U.S. government’s online surveillance efforts, people have been clamoring for increased privacy. And to answer that call, developers have taken on the challenge of improving internet security. But despite the appeal for it and developers providing users with better options, consumers just aren’t biting. Not even the simplest of […]

Read more

Fact: Insiders Are Often the Culprits in Network Security Breaches

Over the past few years, there have been a number of security breaches in financial services enterprises. And because of these, financial companies now face larger scrutiny in terms of the security of their respective networks. As they work to beef up their defenses and rebuild the fragmented trust of their customers, they’re now under […]

Read more

Now Available: The High-Security IronKey H350 USB 3.0

Just this June, Imation has announced the release of the high-security and high-performance IronKey H350. It’s the only USB 3.0 hard drive currently available in the market to achieve FIPS 140-2 Level 3 validation, meeting the most stringent 256-bit encryption requirements mandated for government agencies, defense contractors, financial services, and healthcare. The aforementioned agencies and […]

Read more