Find

March 17, 2020

Beware scams exploiting coronavirus fears

Emergencies offer golden opportunities for con artists to launch fraudulent campaigns that feed off, and cash in on, the climate of concern. Against the backdrop of a disease that has so far caused more than 4,000 deaths and continues to spread, scammers have wasted no time in playing on people’s fears or evoking feelings of compassion.
by | 4 min read
March 9, 2020

Fortinet introduces Self-Learning AI appliance

Fortinet has invested heavily in FortiGuard Labs cloud-based AI-driven threat intelligence, allowing us to detect more threats, more quickly and more accurately. FortiAI takes the artificial intelligence knowledge from FortiGuard Labs and packages it specifically for on-premises deployments.
by | 4 min read
February 26, 2020

Plugin flaw leaves up to 200,000 WordPress sites at risk of attack

A popular WordPress theme plugin that’s installed on some 200,000 websites has been found to contain a serious vulnerability that, if abused, could allow remote attackers to wipe the sites and gain admin access to them.
by | 2 min read
February 25, 2020

Sensitive plastic surgery photos exposed online

Researchers at vpnMentor, who uncovered the leak, were able to access some 900,000 individual records. These ranged from before-and-after images and videos of cosmetic procedures to materials of a highly sensitive nature, including graphic photos of the patients’ private body parts. The origin of the records is not clear but it can be assumed that the leak affected NextMotion clients.
by | 2 min read
February 20, 2020

3 ways to avoid getting phone hacked

Mobile phones are becoming a fruitful and surprisingly easy target for hackers. It used to be that businesses issued their executives work phones that used only business applications. But today, our phones are just as likely to hold intellectual property memos as they are to be used for listening to music.
by | 4 min read
February 5, 2020

Threat actors pivot toward more targeted attacks, SonicWall

Cybercriminals are honing their ability to design, author and deploy stealth-like attacks with increasing precision while growing their capabilities to evade detection by sandbox technology,” said SonicWall President and CEO Bill Conner.
by | 3 min read
February 4, 2020

Shadow IoT devices a threat for Corporate Networks, Infoblox

Shadow IT devices are defined as IoT devices or sensors in active use within an organisation without IT’s knowledge. Shadow IoT devices can be any number of connected technologies including laptops, mobile phones, tablets, fitness trackers or smart home gadgets like voice assistants that are managed outside of the IT department.
by | 3 min read
January 27, 2020

Network Security must keep up with VSS

The Middle East is one of the fastest-growing markets for video surveillance systems. Research firm MarketsandMarkets reports that a big driver for the increasing use of video surveillance systems globally is in large part due to the increasing concerns for public safety and security, prompting deployment at airports, malls, schools, office buildings, public places and so on.
by | 2 min read
January 25, 2020

Using AI to level the cyber playing field

According to one report, cyber criminals cost the global economy a total of $1.5 trillion last year. And the rate of growth for cybercrime looks likely to continue for some time unless organizations make a significant paradigm shift as to how they think about and deploy security.
by | 3 min read