Almost half of UK businesses would pay ransom following an attack

UK businesses are most likely to pay up following a ransomware attack, new figures have claimed. Research by security firm Malwarebytes found that almost half (49 per cent) of UK businesses would pay ransom following a ransomware attack. Globally, the figure sits somewhat lower, at 42 per cent, according to Malwarebytes’ “Second Annual State of …

ESET warns of Malware capable of cause power outages

Two cyber security firms have uncovered malicious software that they believe caused a December 2016 Ukraine power outage, they said on Monday, warning the malware could be easily modified to harm critical infrastructure operations around the globe. ESET, a Slovakian anti-virus software maker, and Dragos Inc, a U.S. critical-infrastructure security firm, released detailed analyses of …

Trump Administration to revise driverless car guidelines

The Trump administration is said to be revising the existing guidelines for driverless vehicles. Updated guidance on the emerging technology is expected to be released in the next few months, Transportation Secretary Elaine Chao said, according to multiple reports. “The pressure is mounting for the federal government to do something,” Chao said during a conference …

Report Urges Security providers to consider offering DDoS protection as a service

A new report by Corero Network Security suggests that offering DDoS protection as a service is a viable business idea. Out of its respondents, 82 percent see a “clear business opportunity” in providing DDoS protection as a service to its customers. Also, 93 percent see providing DDoS mitigation in relation to other types of security …

Google’s new cloud-based service shows increasing need of IoTs

Google has launched a new cloud-based service called IoT Core that enables its enterprise customers to manage their IoT devices, as well as collect and analyze the data those devices produce. IoT Core has access to all its data processing, analytics, and machine learning capabilities of Google’s cloud and supports devices equipped with Intel, ARM, …

How DNSSEC Works

With DNSSEC, a DNS response now contains not only an answer but also a digital signature over that data made by the private key of the zone where the data originates. Validating this signature requires the zone’s public key – which DNSSEC conveniently stores in the DNS – so obtaining the required key for validation is …

Symantec’s annual Internet Security Threat Report Details a Scary 2017

Symantec’s 2017 Internet Security Threat Report reads more like a catalog of horrors for CIS and their staffs, with cyber spies and criminals running amuck everywhere. In 2016 as internet security threats mushroomed, cyber criminals and state-sponsored saboteurs pursued aggressive capers that included multi-million dollar virtual bank heists, some of the biggest distributed denial of …

Cyber Breaches on the Financial sector skyrocketed in 2016

More than 200 million financial services records were breached in 2016, representing a 937% percent increase over the previous year, according to data from IBM. The monetary gains associated with corporate and customer data available throughout the financial sector proved appetising to cybercriminals in a year which saw hackers switch their focus away from the …

Cyber criminals shift target to financial advisers

Digital experts have warned that hackers could increasingly target financial advice firms now retail banks are splurging on cyber security to protect customers’ cash. Cyber security has become a hot topic in recent months, with the government launching the National Cyber Security Centre to address weaknesses in the IT systems of financial firms, particularly big …