Security flaw in EA’s Origin client exposed gamers to hackers

Electronic Arts has fixed a vulnerability in its online gaming platform Origin after security researchers found they could trick an unsuspecting gamer into remotely running malicious code on their computer. The bug affected Windows users with the Origin app installed. Tens of millions of gamers use the Origin app to buy, access and download games. […]

Read more

Cyber-Security Incident Response Plans Lacking, IBM Reports

Defending against potential cyber-attacks isn’t just about prevention; it’s also about having the resilience to respond and recover. Unfortunately, the majority of organizations aren’t properly prepared for cyber-security incident response, according to the 2019 Study on the Cyber Resilient Organization, released on April 11 by IBM Security. The report was conducted by the Ponemon Institute […]

Read more

Vigilante cyber security: collaboration is better than proactive cyber security

Can organisations realistically go on the offensive? Jonathan Couch saddles up to fire-off some words about proactive cyber security, it seems it helps if they can gather up a posse first, because proactive collaborative cyber security can work. Proactive cyber security is now seen by security teams as a viable solution to the challenge of […]

Read more

Should cyber-security be more chameleon, less rhino?

Billions are being lost to cyber-crime each year, and the problem seems to be getting worse. So could we ever create unhackable computers beyond the reach of criminals and spies? Israeli researchers are coming up with some interesting solutions. The key to stopping the hackers, explains Neatsun Ziv, vice president of cyber-security products at Tel […]

Read more

The “dark overlord” strikes the practice of law: what law firms can do to protect themselves

Cybersecurity breaches involving law firms are on the rise with each passing year. Law firms are prime targets for cyber criminals seeking confidential and sensitive information because of the various types of legal work that law firms normally handle for their clients. Whether it be mergers and acquisitions, the use of intellectual property, purchase agreements, […]

Read more

Peeling the Onion — Security Onion OS

In a world where security threats feel out of control, the security professional needs some help to do their job. Security tools are an important part of the armory for those professionals. But there is quite a bit of choice, including open-source enterprise toolkits. The question being asked is do you build your own setup, […]

Read more

Cyberattacks: Europe gets ready to face crippling online assaults

Europe is gearing up to deal with the impact of large-scale international cyberattacks. “The possibility of a large-scale cyber-attack having serious repercussions in the physical world and crippling an entire sector or society, is no longer unthinkable,” warned Europol, the European Union’s (EU) law enforcement agency, which focuses on terrorism, cybercrime and serious and organised […]

Read more

Bulgarian cyber safety chief warns public towards on-line scams

SOFIA, March 6 (Xinhua) — Naive or careless people have still been misled to pay large amounts of money to online fraudsters, a Bulgarian cyber security chief said here on Wednesday. “Fraudulent shopping sites are the easiest scam that is circulating on the Internet,” Svetlin Lazarov, head of Cyber Intelligence and Digital Forensics at the […]

Read more

1 2 3 8
top