BT Security and the WannaCry attack
Mark Hughes, CEO of BT Security, tenders this statement: WannaCry brought to the front many of the issues we, security professionals have been highlighting for considerable time. It is not the first global attack, but it is unique in its scope and the way it spread....
How to defend against WannaCry
An unprecedented wave of ransomware infections is hitting organizations in all industries around the world. The culprit: the WannaCry/WCry ransomware (detected by Trend Micro as RANSOM_WANA.A and RANSOM_WCRY.I). Trend Micro has been tracking WannaCry since its...
WannaCrypt update from Kaspersky Lab
On Friday 12 May 2017, organisations across the world were hit by a massive ransomware attack, named WannaCry, which exploited a (now patched) Microsoft Windows vulnerability revealed in the Shadowbrokers dump on March 14. Kaspersky Lab researchers have continued to...
Attacks highlights need for cyber insurance
The fresh ransomware attack of unprecedented proportions, estimated to have impacted at least 100 countries, and affecting massive global organisations such as FedEx, Britain’s national health and the German rail network has highlighted the severe implications of...
Insulating your business against ransomware threats
The world has been shaken by a massive ransomware attack. Jonathan Kropf, CEO of Tarsus On Demand, offers some advice on how to keep your systems safe. It’s one of the world’s fastest-growing industries, it’s already a multibillion dollar global criminal enterprise...
HID improves fingerprint accuracy
HID Global has enhanced its compact, cost-effective Lumidigm M-Series fingerprint solutions. Bringing the ease-of-use and reliability of multispectral imaging technology into challenging yet cost-sensitive applications such as time and attendance, physical access...
Android permission security flaw spotted
Check Point researchers have spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types of attacks, including...
CA payment security reduces online fraud loss
CA Technologies has launched its CA Risk Analytics Network, a card-issuer network that stops card-not-present fraud instantly for network members. Using realtime behaviour analytics, machine learning and global transaction data it can reduce online fraud losses by an...
Tips for hybrid network-enabled security
The information and communications technology (ICT) sector is one of the main driving forces behind organisational competitiveness in the modern business environment. Modern businesses increasingly rely on network-supported technologies, such as cloud computing,...
Securing the software-defined data centre
The term “digital transformation” is on every CIO’s lips today, and a large part of this transformation, is the move to a software-defined data centre (SDDC). “The SDDC is the IT infrastructure of tomorrow,” says Lutz Blaeser, MD of Intact Software Distribution. “For...
Technology is useful against procurement fraud
The integrity of state expenditure at all levels of governance has come under increasingly heavy fire from South African citizens over the past few years, as the press has reported on the growing incidence of conflict of interest in public procurement. In August 2016,...
Metasys delivers new graphics, enhanced security
The new Metasys 8.1 building automation system from Johnson Controls delivers new graphics, enhanced security and other features to mitigate risk, reduce cost and maximise investments. Optimised for mobility, the system’s easy-to-use interface employs new...