cyber security

Safeguarding Your Future

Five steps to preventing sensitive business data loss BY Mark Stevens While today’s data breaches may differ in terms of attack type and origin, they all produce the same result—significant data loss. Data is the lifeblood of most modern companies and the long-term negative impact on those who suffer breaches demonstrates just how serious the issue

[ Read More ]

Network Security

BY Nicolai Solling The rise of networks’ security related incidents has in recent years brought the subject onto the forefront of IT discussions. Today, the ability to mitigate risks is even seen as a competitive edge, rated at the same level as cost. Simply put, the organizations which can operate their businesses flexibly in a

[ Read More ]

Facebook Tests End-to-End Encryption on Messenger

July 9 – Facebook Inc on Friday said it began testing end-to-end encryption on its popular Messenger application to prevent snooping on digital conversations. The limited testing on Messenger, which has more than 900 million users, comes three months after Facebook rolled out end-to-end encryption to its more popular WhatsApp, a messaging application with over

[ Read More ]

Fed Records Show Dozens of Cybersecurity Breaches

By Jason Lange and Dustin Volz WASHINGTON, June 1 – The U.S. Federal Reserve detected more than 50 cyber breaches between 2011 and 2015, with several incidents described internally as “espionage,” according to Fed records. The central bank’s staff suspected hackers or spies in many of the incidents, the records show. The Fed’s computer systems

[ Read More ]

SWIFT to Unveil New Security Plan After Hackers’ Heists

By Huw Jones and Tom Bergin LONDON, May 24 – The SWIFT secure messaging service that underpins international banking said it plans to launch a new security programme as it fights to rebuild its reputation in the wake of the Bangladesh Bank heist. The Society for Worldwide Interbank Financial Telecommunication (SWIFT)’s chief executive, Gottfried Leibbrandt

[ Read More ]

Cyber Attacks on Daesh Use Tools Others Also Have: U.S. Defense Chief

By Joseph Menn SANTA CLARA, May 11 – Cyber attack techniques used by the U.S.-led coalition against Daesh could also be used by other countries, U.S. Defense Secretary Ashton Carter said on Wednesday. Speaking in California, Carter told reporters that the U.S.-led coalition used electronic techniques to disrupt and degrade the jihadist force’s ability to

[ Read More ]

When Mobsters Meet Hackers – the New, Improved Bank Heist

By Jeremy Wagstaff and Jim Finkle March 31 – No need for stocking masks and sawn-off shotguns. The unprecedented heist of $81 million from the U.S. account of Bangladesh’s central bank is the latest among increasingly large thefts by criminals who have leveraged the speed and anonymity of hacking to revolutionise burgling banks. Hundreds of

[ Read More ]

Israeli Firm Helping FBI to Open Encrypted iPhone: Report

TEL AVIV, March 23 – Israel’s Cellebrite, a provider of mobile forensic software, is helping the U.S. Federal Bureau of Investigation’s attempt to unlock an iPhone used by one of the San Bernardino, California shooters, the Yedioth Ahronoth newspaper reported on Wednesday. If Cellebrite succeeds, then the FBI will no longer need the help of

[ Read More ]

Software, Printer Problems Delayed Discovery of Bangladesh Heist

By Serajul Quadir DHAKA, March 17 – The cyber thieves who stole $81 million from Bangladesh Bank hid their tracks by installing malware that manipulated a central bank printer to hide evidence of the heist, according to a person familiar with the investigation. Earlier, two central bank officials filed a police report that said that

[ Read More ]

Privacy vs Security at Heart of Apple Phone Decrypt Order

By Jim Finkle and Joseph Menn Feb 17 – A court order demanding that Apple Inc help the U.S. government unlock the encrypted iPhone of one of the San Bernardino shooters is shaping up as a crucial test case of how far the government can go in forcing technology companies to help security and intelligence

[ Read More ]