Category: Cyber Security – Computer Business Review

5 Questions with… CybSafe CEO Oz Alashe

From first black Parachute Regiment officer, to CEO… The post 5 Questions with… CybSafe CEO Oz Alashe appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: 5 Questions with… CybSafe CEO Oz Alashe

Infosecurity Europe Cancelled (Finally)

Organiser eyes a digital event, and physical postponement… The post Infosecurity Europe Cancelled (Finally) appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Infosecurity Europe Cancelled (Finally)

Zoom Security Storm: Company Apologises, Hackers Squabble

“We’ve fallen short…” The post Zoom Security Storm: Company Apologises, Hackers Squabble appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Zoom Security Storm: Company Apologises, Hackers Squabble

Marriott International Cites Insurance to Downplay Data Breach

But security experts say the incident is deeply troubling… The post Marriott International Cites Insurance to Downplay Data Breach appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Marriott International Cites Insurance to…

Finastra, World’s Third Largest Fintech, Hit by Ransomware

“We are anticipating some disruption to certain services” The post Finastra, World’s Third Largest Fintech, Hit by Ransomware appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Finastra, World’s Third Largest Fintech, Hit…

Coronavirus-Related Domain Registrations Rise 6,000 in a Week

Coronavirus-themed malware discounts proliferate on the Dark Web The post Coronavirus-Related Domain Registrations Rise 6,000 in a Week appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Coronavirus-Related Domain Registrations Rise 6,000 in…

Home Office Inches Closer to Unified Crime Data Lake

Needed: Knowledge of managing security services on AWS, Windows, Red Hat, Nessus, and Splunk The post Home Office Inches Closer to Unified Crime Data Lake appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete…

Casinos in Las Vegas Hit by Suspected Ransomware Attack

“We are actively monitoring the situation” The post Casinos in Las Vegas Hit by Suspected Ransomware Attack appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Casinos in Las Vegas Hit by Suspected…

Consumer IoT Devices are Flooding Corporate Networks

Security firm finds a fridge, a smart lamp connected to corporate networks The post Consumer IoT Devices are Flooding Corporate Networks appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Consumer IoT Devices…

McAfee Agrees to Buy Browser Isolation Specialist

Browser isolation technology is hot property… The post McAfee Agrees to Buy Browser Isolation Specialist appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: McAfee Agrees to Buy Browser Isolation Specialist

Firefox Sets DNS-over-HTTPs as Default: DoH!

Global users also get to opt-in if desired… The post Firefox Sets DNS-over-HTTPs as Default: DoH! appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Firefox Sets DNS-over-HTTPs as Default: DoH!

OpenBSD Pwned, Patched Again: Bug is Remotely Exploitable

Exploit lets user execute arbitrary shell commands as root… The post OpenBSD Pwned, Patched Again: Bug is Remotely Exploitable appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: OpenBSD Pwned, Patched Again: Bug…

Five Questions with…Cerebri AI CEO Jean Belanger

“Everyone around me complained how they disliked school, but it was my escape” The post Five Questions with…Cerebri AI CEO Jean Belanger appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Five Questions…

Apple Unilaterally Slashes TLS Certificate Trust Period

ACME protocol, supported by more than 130 open source tools, might help ease the pain for website owners… The post Apple Unilaterally Slashes TLS Certificate Trust Period appeared first on Computer Business Review.   Advertise on IT Security News. Read…

Security Management and Risk Management Will Merge

“A security audit generally has the auditor asking questions of the auditee, with a techie on hand. In 2020, that’s going to change…” The post Security Management and Risk Management Will Merge appeared first on Computer Business Review.   Advertise…

Adobe, Intel, Microsoft Drop Critical Security Fixes

You’ve 99 Microsoft CVE problems but a patch ain’t one… The post Adobe, Intel, Microsoft Drop Critical Security Fixes appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Adobe, Intel, Microsoft Drop Critical…

Equifax Hack: US Indicts PLA

Equifax’s “antiquated” IT systems made the hack easy… The post Equifax Hack: US Indicts PLA appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: Equifax Hack: US Indicts PLA

BYO Hardware Driver: New Ransomware Attacks Kernel Memory

“This is the first time we have seen ransomware bring its own legitimately signed, albeit vulnerable, third-party driver to take control of a device” The post BYO Hardware Driver: New Ransomware Attacks Kernel Memory appeared first on Computer Business Review.…

Flying Blind: 70% of Airport Websites Contain Vulnerabilities

Real risk that attackers could start “aiming attacks at the airports directly to disrupt critical national infrastructure.” The post Flying Blind: 70% of Airport Websites Contain Vulnerabilities appeared first on Computer Business Review.   Advertise on IT Security News. Read…

Google Continues to Prod Holes in Apple’s Security

One vulnerability “could allow attackers nearby to remote control any Mac systems with zero interaction.” The post Google Continues to Prod Holes in Apple’s Security appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete…

New IoT Security Regulations: The Devil’s in the Details

Enforcement not agreed, labelling scheme ruled out, The post New IoT Security Regulations: The Devil’s in the Details appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: New IoT Security Regulations: The Devil’s…

VMware Warns Over AMD Driver Vulnerabilities

Get patching… The post VMware Warns Over AMD Driver Vulnerabilities appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: VMware Warns Over AMD Driver Vulnerabilities

FireEye Buys Cloudvisory, in Seventh Security Acquisition

Firm provides agentless monitoring of network flows across multiple cloud providers The post FireEye Buys Cloudvisory, in Seventh Security Acquisition appeared first on Computer Business Review.   Advertise on IT Security News. Read the complete article: FireEye Buys Cloudvisory, in…