Marketing

Security is everyone’s business

Credit: ID 162037013 © Chakkree Chantakad | Dreamstime.com Whether you work for a big enterprise or small business, you have people that look after your IT and cybersecurity needs. They have it covered, that’s not your responsibility or even something you understand. Cybersecurity is that weird black magic that hackers on both sides (good and […]

Marketing

Prediction #5: Application Programming Interfaces (API) Will Be Exposed as The Weakest Link Leading to Cloud-Native Threats

Credit: ID 115146030 © Tawatdchai Muelae | Dreamstime.com A recent study showed that more than three in four organizations treat API security differently than web app security, indicating API security readiness lags behind other aspects of application security. The study also showed that more than two-thirds of organizations expose APIs to the public to enable […]

Marketing

Prediction #4: DevSecOps Will Rise to Prominence as Growth in Containerized Workloads Causes Security Controls to ‘Shift Left’

Credit: ID 89487267 © Tawatdchai Muelae | Dreamstime.com Container-based cloud deployments are growing in popularity due to the ease with which DevOps teams can continuously roll out micro-services and interacting, reusable components as applications. As a result, the number of organizations prioritizing the adoption of container technologies will continue to increase in 2020. Gartner predicts […]

Marketing

Prediction #3: Ransomware Attacks to Morph into Two-Stage Extortion Campaigns

Credit: ID 159010131 © Tawatdchai Muelae | Dreamstime.com In McAfee’s 2019 threat predictions report, we predicted cyber criminals would partner more closely to boost threats; over the course of the year, we observed exactly that. Ransomware groups used pre-infected machines from other malware campaigns, or used remote desktop protocol (RDP) as an initial launch point for […]

Marketing

Prediction #2: Adversaries to Generate Deepfakes to Bypass Facial Recognition

Credit: ID 142202786 © Tawatdchai Muelae | Dreamstime.com Computer-based facial recognition, in its earliest forms, has been around since the mid-1960s. While dramatic changes have since taken place, the underlying concept remains: it provides a means for a computer to identify or verify a face. There are many use cases for the technology, most related […]

Marketing

Prediction #1: Broader Deepfakes Capabilities for Less-skilled Threat Actors

Credit: ID 159236290 © Tawatdchai Muelae | Dreamstime.com The ability to create manipulated content is not new. Manipulated images were used as far back as World War II in campaigns designed to make people believe things that weren’t true. What’s changed with the advances in artificial intelligence is you can now build a very convincing […]

Marketing

AFP takes down website distributing malware used by domestic abusers

Credit: LT Law enforcement in Australia, the Europe Union and the UK have coordinated to take down an Australian-hosted website that was used to distribute software tools for attackers to spy on targets.  The UK’s National Crime Agency, the Australian Federal Police and Europol on the weekend revealed a joint effort to take down an […]

Marketing

Google: 80% of Android apps encrypt traffic by default

Google’s work to tighten up protection of network traffic from Android devices to web services that began three years ago is finally paying off.     In 2016, Google gave Android app developers the tools to ensure traffic from apps were encrypted over the Transport Layer Security protocol, which enables the secure version of HTTP […]

Marketing

Week in security: As Black Friday deals wind up, nation-state cybercrims are changing focus

Credit: ID 136553455 © Rashad Aliyev | Dreamstime.com Retailers are well aware that the increasing levels of transactions over the Black Friday-to-Cyber Monday long shopping weekend make them vulnerable to fraud and malware – and the actual levels of compromise will soon become clear in the wake of warnings that online shoppers were being targeted […]

Marketing

Cloud security is taking a back seat to cloud enthusiasm

Credit: ID 20934463 © Suriyaphoto | Dreamstime.com The ease with which cloud-based architectures facilitate third-party communications will make them a key security risk in coming years, security experts have warned as Australian firms rush headlong into the cloud without fully considering its implications. Ever more-mature understanding of cloud platforms is seeing cybercriminals refining their strategies […]