Report Urges Security providers to consider offering DDoS protection as a service

A new report by Corero Network Security suggests that offering DDoS protection as a service is a viable business idea. Out of its respondents, 82 percent see a “clear business opportunity” in providing DDoS protection as a service to its customers. Also, 93 percent see providing DDoS mitigation in relation to other types of security …

Apple eyes 5G Roll out to enhance iPhone internet speed

“Apple Inc. seeks to assess cellular link performance in direct path and multi-path environments between base station transmitters and receivers using this spectrum,” reads the application, according to BI. “These assessments will provide engineering data relevant to the operation of devices on wireless carriers’ future 5G networks.” A report from Business Insider states that Apple …

Google’s new cloud-based service shows increasing need of IoTs

Google has launched a new cloud-based service called IoT Core that enables its enterprise customers to manage their IoT devices, as well as collect and analyze the data those devices produce. IoT Core has access to all its data processing, analytics, and machine learning capabilities of Google’s cloud and supports devices equipped with Intel, ARM, …

Microsoft to set up data center in Africa

Microsoft software giant has announced it will deliver its cloud service to users in Africa from data-centers in Johannesburg and Cape Town beginning next year. We plan to deliver the Microsoft Cloud — including Microsoft Azure, Office 365 and Dynamics 365 — from datacenters located in Johannesburg and Cape Town, with initial availability in 2018. …

WannaCry ransomware affects over 150 countries, Africa least hit

On Friday 12th May, organizations across the world were hit by a massive ransomware attack, named WannaCry, which exploited a (now patched) Microsoft Windows vulnerability revealed in the Shadowbrokers dump on April 14. This latest variant of ransomware  according to Avast Security data,  is mainly being targeted to Russia, Ukraine and Taiwan, but the ransomware …

How DNSSEC Works

With DNSSEC, a DNS response now contains not only an answer but also a digital signature over that data made by the private key of the zone where the data originates. Validating this signature requires the zone’s public key – which DNSSEC conveniently stores in the DNS – so obtaining the required key for validation is …

Trump Exec. Order Could Move Federal Cybersecurity to the Cloud

A new Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure has been signed. The order is targeting the federal government’s notorious vulnerability to cyber threats, mandating one set of standards and making the heads of each government agency responsible for security. “The United States invented the internet and we need …

Credit Unions can now have .CREDITUNION, to compete .BANK gTLD

BOSTON, May 4, 2017 /PRNewswire/ — Starting today, Credit Unions can now have their own Internet brand: .CREDITUNION, to compete with the highly successful .BANK extension.  As the leading .BANK Registrar, EnCirca is pleased to announce pre-screening services for all U.S.-based Credit Unions.  Credit unions are invited to apply today for a pre-verification and to see …

Symantec’s annual Internet Security Threat Report Details a Scary 2017

Symantec’s 2017 Internet Security Threat Report reads more like a catalog of horrors for CIS and their staffs, with cyber spies and criminals running amuck everywhere. In 2016 as internet security threats mushroomed, cyber criminals and state-sponsored saboteurs pursued aggressive capers that included multi-million dollar virtual bank heists, some of the biggest distributed denial of …