Cyber Security

­

Qatar National Bank hit by cyber attack; 1.4GB file archive leaked online

Qatar National Bank, the largest lender in the Middle East and Africa by assets, is investigating an alleged security breach of data posted online this week that revealed the names and passwords of a large number of customers. Qatar National Bank is probing reports of an online leak of confidential data of a large number [...]

April 28th, 2016|Cyber Security, Security NEWS|

It looks like Spotify was hacked – change your password ASAP, if you still can

If you’re one of the millions of people around the world who count themselves as Spotify users, we have some troubling news: it looks like Spotify recently suffered a security breach. A list containing hundreds of sets of account credentials was published late last week to popular anonymous text file sharing site Pastebin, and several of [...]

FBI Cyber Warning: Ignore Your CEO’s E-Mail And Phone Her Back — Or Your Company May Pay For It

The FBI is warning people about a business email scheme which has resulted in huge losses to companies in Phoenix and other U.S. cities. Here’s how the scam works: A CEO seemingly emails an employee — typically in a finance or administrative role — instructing them to perform a wire transfer. The employee follows directions [...]

Mobile App Leads to Speeding Ticket Email Scam

A clever scam that involves a “free mobility or traffic app” is duping users by tracking their whereabouts and then sending a fake speeding ticket. Police in Pennsylvania detailed a scam that involves a mobile app, which may have been used to target people by sending them legitimate-looking speeding tickets via email. The app includes [...]

Spot a Phishing Attack

  Smart companies know the best offense against security threats is a strong defense. And what type of defense is the most successful, you ask? Educating Employees! A stunning 91% of data breaches start with employees, making it essential for organizations to educate all employees on the threats associated with today's online world. [...]

A Simple Explanation of Cross Site Scripting

Cross-site scripting (XSS) is a security vulnerability allowing a user to alter the code that an application delivers to a user which is executed in the user’s web browser. It is most commonly found in web applications affecting the user's browser, but also possible in other applications with embedded web content, such as an interactive [...]

Cybersecurity National Action Plan: Obama Outlines Plans to Spend $19 billion on Cybersecurity

On February 9th President Obama announced the Cybersecurity National Action Plan, including steps such as establishing a cybersecurity commission, introducing new safeguarding measures and supporting both companies and consumers in strengthening their own security. He’s also put the money where his mouth is and backed this up by reserving $19billion of spending to implement the [...]

February 19th, 2016|Cyber Security|

The Importance of Finding All Vulnerabilities on Your Web Applications

Many businesses understand that it’s important to properly manage their web application security. But in truth, it goes far beyond the need to simply “avoid being hacked”. There are often serious liabilities associated with the failure to properly manage your security. Unfortunately, many of those liabilities are an afterthought. Until of course, there is a [...]

Latest Report Points to a 45% Increase in Web Application Attacks

A few weeks back Alert Logic released their latest cloud security report. The report highlights the current rise in web application attacks. In short it states “‘Businesses with a large volume of online customer interactions are targeted for web application attacks in order to gain access to sensitive customer & financial data". This 45% increase [...]

Vulnerabilities in the headlines: 2015

Linux Kernel Vulnerability and how to fix it A flaw in the Linux Kernel has made big news lately, labelled as a local privilege escalation vulnerability. In fact, the company ‘Perception Point’ which released news of the flaw is under criticism as after reporting it to the Linux kernel maintainers, who were then developing a [...]

January 8th, 2016|Cyber Security|