Botnets Evolving to Mobile Devices

Millions of mobile devices are now making requests in what’s described as “an attack on the economy.” Botnets have tended to hide in the nooks and crevices of servers and endpoint devices. Now a growing number are hiding in the palms of users’ hands. That’s one of the conclusions of a new report detailing the …

Continue reading

Small businesses aren’t properly prepared for cyberattacks

Even though businesses all over the world are increasingly taking online protection seriously – they still aren’t 100 per cent confident they could tackle serious cybersecurity threats. Polling 600 businesses in the US, UK and Australia, a study by Webroot found that new types of attacks are dominating in 2018 (compared to the year before) …

Continue reading

Hospitality industry under siege from botnets

The hospitality industry, including hotels, airlines and cruise lines, is the biggest target for cyber criminal botnet attacks that abuse credentials and overwhelm online systems, a report reveals Cyber security defenders face increasing threats from bot-based credential abuse targeting the hospitality industry, a report shows. Bot-based attacks are also being used for advanced distributed denial …

Continue reading

Cyber attack warnings highlight need to be prepared

Fresh warnings about the vulnerability of national infrastructure to cyber attacks show the need for securing and monitoring associated control systems connected to the internet. The commander of Britain’s Joint Forces Command has warned that UK traffic control systems and other critical infrastructure could be targeted by cyber adversaries – but industry experts say this …

Continue reading

How employee behavior impacts cybersecurity effectiveness

A recent OpenVPN survey discovered 25 percent of employees, reuse the same password for everything. And 23 percent of employees admit to very frequently clicking on links before verifying they lead to a website they intended to visit. Sabotaging corporate security initiatives Whether accidental or intentional, an employee’s online activities can make or break a …

Continue reading