How iOS Malware May Snoop on Our Devices

How iOS Malware May Snoop on Our Devices

Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t have them. We carry so much of our lives on our devices, from our social media accounts and photos of our pets to our banking information and home addresses. Whether it be just for fun or for occupational purposes, so much of our time and attention is spent on our smartphones.  Because our mobile devices…

Read More

African tech start-up funding skyrockets, with fintech a big winner

African tech start-up funding skyrockets, with fintech a big winner

Africa’s tech start-ups are thriving. In 2021, more African tech start-ups raised more money from more investors than ever before, with fintech companies — including several based in Nigeria — heavily represented among  the big winners. According to the seventh edition of Disrupt Africa’s African Tech Startups Funding Report, 564 African tech start-ups raised just over US$2 billion in funding in 2021, which is a 206% increase from 2020. Disrupt Africa’s report shows that the…

Read More

Q&A: What CIOs need to know about Oracle Cloud in the Middle East

Q&A: What CIOs need to know about Oracle Cloud in the Middle East

Among the cloud providers rushing into the Middle East to meet growing demand, Oracle has been one of the busiest in the region, in just the last two years opening up cloud regions in Jeddah, Dubai, Jerusalem and, most recently, in Abu Dhabi. The company doesn’t plan to stop there — among other things, it has said it will open a second cloud region in Saudi Arabia. It’s all part of Oracle’s plan to open…

Read More

Privacy Becomes Mission Critical – Cisco Blogs

Privacy Becomes Mission Critical – Cisco Blogs

It’s been more than 3 years since the EU’s General Data Protection Regulation (GDPR) went into effect, and over two-thirds of the world’s countries have now enacted privacy laws. The ongoing COVID-19 pandemic has presented challenges in keeping personal data safe, and most have reaffirmed their commitment to privacy’s requirements and principles. Even more importantly, customer requirements and business value have driven organizations to ensure data is well protected as privacy has become mission critical…

Read More

Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

Cybercriminals Hunt For Medical Data. Zero Trust As The Only Good Option To Keep The Healthcare System Secure

By Tomasz Kowalski, CEO, Secfense According to a Trustwave report, medical data may cost up to $250 per record on the black market, while stolen payment card data is sold for $5.40. That is why the healthcare institutions are becoming the main vector of cybercriminals attacks. How to defend against them? The right approach is to protect the space where usually attacks come the most often so the accounts of all employees of clinics or…

Read More

Increasing Adoption of Phishing Kits Puts MFA at Risk

Increasing Adoption of Phishing Kits Puts MFA at Risk

Anti-Phishing, DMARC , Fraud Management & Cybercrime , Incident & Breach Response Kit Enables ‘Man in the Middle’ Browser Session; MFA Makes Attackers Work Harder Prajeet Nair (@prajeetspeaks) • February 5, 2022     Because of increased use of multifactor authentication, attackers are developing phishing kits that steal tokens and bypass this trusted layer of security. See Also: Live Webinar | How to Stop the Four Horsemen of the Data Loss Apocalypse “Threat actors…

Read More

The Top 5 Cloud Security Predictions for 2022

The Top 5 Cloud Security Predictions for 2022

New threats, new apps, new players – but data plays the biggest role in shaping the future. By Amit Shaked, CEO, Laminar 2021 Attacks Set New Records Looking back, 2021 had its fair share of cybersecurity incidents. Take for example the Colonial Pipeline breach, where the U.S. fuel supply was at risk of coming to a grinding halt. A ransom of $2.3 million in Bitcoin was paid to avoid catastrophe and continue business operations. You…

Read More

Cyber Defense Media Group Launches CyberDefenseCon 2022

Cyber Defense Media Group Launches CyberDefenseCon 2022

On the heels of its 10th anniversary, Cyber Defense Media Group announces the exclusive Cyber Defense Conference for 2022 a.k.a. CyberDefenseCon 2022. This event will be taking place in Orlando, FL near Universal Studios and near Disney World on April 19th and April 20th of 2022. Hosted by Gary Miliefsky, a globally recognized cyber security expert and the publisher of Cyber Defense Magazine, this is one of the most exclusive, fun and educational CISO conferences…

Read More

Emotet’s Uncommon Approach of Masking IP Addresses

Emotet’s Uncommon Approach of Masking IP Addresses

Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and octal formats to represent IP address which is usually represented by decimal formats. An example of this is shown below: Hexadecimal format: 0xb907d607 Octal format: 0056.0151.0121.0114 Decimal format: 185.7.214.7 This change in format might evade some AV products relying on command line parameters but McAfee was still able to protect our…

Read More

Cloud or No Cloud, Hybrid IT is the Way for Today’s Enterprise

Cloud or No Cloud, Hybrid IT is the Way for Today’s Enterprise

For the last decade or so, cloud computing has seen more than its fair share of hype. Even so, the inventors of the technology hype cycle have referred to cloud computing as “one of the most hyped and confusing terms in the history of IT.” If you believed the hyperbole, except for a few Luddites and technological relics, you’d think every enterprise has everything running in the cloud. But the truth is a little more…

Read More
1 3,217 3,218 3,219 3,220 3,221 4,026