Magazine Button

Latest Threats

Attacks targeting IoT and networking vulnerabilities on the rise

Check Point Software Technologies, a leading global provider of cybersecurity solutions, has published its latest Global Threat Index for July 2018, revealing a significant increase in exploits targeting three major IoT vulnerabilities. These attacks, which are linked to the propagation of IoT malware such as Mirai, IoTroop/Reaper and VPNFilter, have more than doubled since May […]

How parents can protect children from disturbing ‘Momo’ game

Kaspersky Lab has issued guidance to parents following reports about a disturbing game targeting young WhatsApp users. Momo is reportedly pitting youngsters against anonymous users, who may spur them to commit violent or suicidal acts. The premise of the game is to challenge teens to communicate with an unknown user, who will send them violent […]

Hot new IoT devices – a prime target for DDoS cyberattacks

There’s a flood of connected devices making their way into our homes and businesses. But these new IoT devices are becoming a prime target for DDoS attacks, says Ronald Sens, Director, EMEA Marketing at A10 Networks. There’s a flood of connected devices making their way into our homes and businesses. From mobile, wearables and car […]

Car sharing apps vulnerable to attack, Kaspersky Lab finds

Kaspersky Lab researchers have examined the security of 13 car sharing applications from household manufacturers across the globe – including those from Russia, the US and Europe. The company’s experts discovered that all of the applications contain a number of security issues that can potentially allow criminals to take control of shared vehicles, either by […]

Fraudsters spoof university email addresses in six figure supply fraud

Cybersecurity experts have joined the call for organisations to protect themselves after Action Fraud issued a warning about a new scam. The scam involves fraudsters registering domain names to look like they belong to UK university email addresses, with UK and European supply companies being defrauded out of vast sums of money as a result. […]

Sophos expert on how to identify and avoid phishing scams

Phishing might be one of the oldest tricks in the books for cybercriminals but it remains a significant threat, with sophisticated new attack methods constantly emerging. Harish Chib, Vice President, Middle East and Africa, Sophos, outlines some of the current trends and offers some advice to help businesses and organisations protect themselves against the scam. […]

Check Point expert digs into the future of cryptomining botnets

By Gadi Naveh, Threat Prevention Evangelist, Check Point The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of applications. And as always, cybercriminals are among the earliest adopters, and unfortunately helping to push forward public awareness of the technology. Cryptomining […]

McAfee Labs research shows cryptocurrency mining malware surge

McAfee, the device-to-cloud cybersecurity company, has released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware and other threats in Q1 2018. McAfee Labs saw on average five new threat samples every second, including growth in cryptojacking and other cryptocurrency mining malware, as well as notable campaigns demonstrating […]

Stay ahead of potential cyberthreats during the World Cup

Sophos, a global leader in network and endpoint security, has reminded football fans of how cybercriminals have used people’s interest in the sport to launch cyberattacks. Football has been targeted before by those who want to turn international community events into attacks. It’s a sad fact that cyberattacks often go hand in hand with major […]

Is cryptojacking replacing ransomware as the next big threat?

John Madisson, Senior Vice President – Products and Solutions at Fortinet, discusses how cryptojacking is emerging as one of the biggest cyberthreats facing global organisations and enterprises. As the threat landscape continues to become more complex and more difficult to fight, it forces security to adapt to meet the demands of automation, agility and analytics. […]

Browse our latest issue

Intelligent CISO

View Magazine Archive