Identifying cyber enemies

It is no longer enough to understand how you are being attacked; you need to understand who is attacking you and why. It is only though this understanding that a successful defence can be undertaken, says Jayson O’Reilly, director of Sales and Innovation at DRS....

PoS terminals fall victim to cybercrime

Cybercriminals continuously discover more ways to successfully target new outlets for financial theft, as revealed in Trend Micro’s first quarter security roundup for 2014, Cybercrime Hits the Unexpected. Greed is motivating cybercriminals to take a non-traditional...

IT spins complex web of interconnected risks

Cyber risk management professionals need to look beyond their internal IT safeguards to the interconnected risks created by counterparties, outsourced suppliers, supply chains, disruptive technologies, upstream infrastructure and external shocks. This is one of the...

E-stores come under phishing attack in March

Despite the increased share of phishing attacks on online stores, the most frequently attacked category of organisation was still social networking sites (23,5%). In March, users of LinkedIn risked giving away their personal data as a result of phishing scams. There...

Bitcoin cybercrime on the increase

The popularity of financial malware targeting Bitcoin grew in 2013, according to the Financial Cyber Threats in 2013 study carried out by Kaspersky Lab. The number of attacks targeting the crypto-currency increased more than 2,5 times and accounted for 8,3-million...