dcsimg

Xenotime: hackers behind Triton malware turn to power grids

The threat to operational technology is our new reality Renaud Deraison tells NS Tech.https://tech.newstatesman.com/security/xenotime-triton-power … [Read more...]

Trolls abuse Twitter Lists to collate their targets

I’ve been using Twitter for more than a decade. And one of its features that I find valuable is Lists. Turns out I’m not the only one. Lists allow Twitter users to group profiles or feeds based on certain criteria, such as sports, tech news, celebrities, fashion—you get the idea. Having Lists makes it a lot easier to find content or catch up on posts I’d otherwise miss without having to … [Read more...]

The Real Cost of a Data Breach: Compliance Penalties are Just the Tip of the Iceberg

I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into the wrong hands. … [Read more...]

2 Attacks Traditional Antivirus Is Powerless to Stop

You do your due diligence when it comes to security: You patch. You have backup in place. You install spam protection on your email servers and train your people to avoid phishing attacks. And you have antivirus (AV) installed on every machine to catch malware that happens to get through all the other defenses. Yet, somehow, your customers still get attacked.  Read More … [Read more...]

An overview of the GDPR with Alice Turley, data protection expert

The GDPR (General Data Protection Regulation), which came into effect on 25 May 2018, places obligations on organisations to be more accountable for data protection.   What is personal data?  Personal data is any information relating to an identified or identifiable natural person (data subject). The GDPR places much stronger controls on the processing of special categories of personal data … [Read more...]

Visibility Over Data Means Better Security – A Summary of InfoSecurity Europe 2019

Walking around the floor of InfoSecurity Europe 2019, one key phrase was being repeated again and again; data-centric security. Increasingly, the way that vendors are helping IT teams to increase their security is through visibility into what is happening with their data. There is always a buzzword or a key phrase that vendors adopt en masse in events like these. Last year, predictably, that … [Read more...]

Exim, deployed on half of email servers, under attack

Satnam Narang warns those running Exim to upgrade to version 4.92 or apply the backported fix to vulnerable versions.https://www.scmagazineuk.com/exim-deployed-half-email-servers-attack/article/1587661 … [Read more...]

Keep your Mail Server Running Smoothly with Today’s MDaemon Maintenance Update

To ensure MDaemon and its plugins provide the most up-to-date security and best performance, we often provide maintenance updates to help our customers get the most out of their business email and collaboration server. Today, we’ve released MDaemon 19.0.2. With this update, we’ve squashed a few minor bugs and updated MDaemon Connector for Outlook to version 6.0.2. More information on … [Read more...]

How to Boost Network Performance Inside China’s Great Firewall

Latency is horrible when connecting from China to any global cloud provider, however, there are legal ways to mitigate this impact. Find out here. Read the post here: How to Boost Network Performance Inside China’s Great Firewall … [Read more...]

Adware and PUPs families add push notifications as an attack vector

Some existing families of potentially unwanted programs and adware have added browser push notifications to their weapons arsenal. Offering themselves up as browser extensions on Chrome and Firefox, these threats pose as useful plugins then haggle users with notifications. A family of search hijackers The first I would like to discuss is a large family of Chrome extensions that were already … [Read more...]