Jul 11, 2016
As cyber criminals become more tactical, moving away from the ‘spray and pray approach’ to more focused and targeted attacks, visibility and scrubbed traffic become essential components of a security strategy for protecting companies, writes Martin...
Jul 6, 2016
The ‘Nigerian Prince’ or ‘419’ email scams we’ve all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively – people are intrinsically positive about the motives of others and are...
Jul 5, 2016
Almost 80% of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as software misconfigurations from human error and malfunctioning network protocols, according to Fortinet. Critical infrastructure...
Jul 5, 2016
Between the hours of 5am and 8am Japan time on 15 May last month, cyber attackers used compromised card details of customers from a Tier 1 bank in Africa to make transactions on a number of customer accounts. Well over 100 cyber crooks made physical cash withdrawals...
Jul 1, 2016
Every time the headlines flood with a new story about a breach at a major organisation, the assumption is that the attackers got in due to a high level of sophistication, or through careful studying of their target looking for the weakest link in the security chain....
Jun 29, 2016
To the average user, phishing emails often appear like harmless requests for information, and seem to come from trusted suppliers, and reputable sources. However, for cyber criminals, phishing is more often than not, the easiest way to get a foot in the door of their...