IT Brief UK - Technology news for CIOs & IT decision-makers

Web Browsing stories - Page 3

Gettyimages 1253294358  5

Microsoft tops list for most imitated brands for phishing attempts

Wed, 21st Jul 2021
#
phishing
#
email security
#
microsoft
Microsoft remains the most impersonated brand for phishing attempts, with 45% of attacks in Q2 2021, according to Check Point Software.
Gettyimages 1213630687

Microsoft top targeted brand by cyber criminals in Q4 2020

Fri, 15th Jan 2021
#
physical security
#
microsoft
#
cyber criminal
Microsoft was the most targeted brand by cyber criminals in Q4 2020, as they tried to exploit remote working during the pandemic. DHL came second.
Cybersecurity34 copy

Why zero trust remote networking is key to thriving in the 'new normal' business world

Wed, 7th Oct 2020
#
malware
#
dlp
#
zero trust security
The shift to remote working has highlighted the need for secure infrastructure. Zero trust remote work can provide the solution.
Gettyimages 509032879

Google and Amazon overtake Apple as most imitated brands - Check Point

Mon, 10th Aug 2020
#
phishing
#
email security
#
google
Google and Amazon were the most imitated brands in phishing attempts for the second quarter of 2020, according to Check Point.
Gettyimages 488437074

Cybercriminals most likely to impersonate Apple, Netflix in phishing attacks

Thu, 16th Apr 2020
#
phishing
#
email security
#
brand exploitation
Cybercriminals are increasingly impersonating major tech companies like Apple, Netflix, and WhatsApp in phishing attacks, warns Check Point's Q1 2020 report.
Screen shot 2018 05 22 at 11

Data from app that enables parents to monitor teen's phone activity leaked

Tue, 22nd May 2018
#
cybersecurity
#
data leak
#
winmagic
How ironic! Tens of thousands of user accounts of an app used by parents to monitor their children's phone activity has been leaked.
Coding

Anti-tracking browser extension Ghostery goes open source

Tue, 13th Mar 2018
#
open source
#
data privacy
#
cybersecurity
Ghostery, a free web browsing software, has announced that its code is now publicly available on GitHub as the company goes open source.
Thinkstockphotos 641517852

United States hot on heels of North Korea's Hidden Cobra malware

Mon, 19th Feb 2018
#
malware
#
ddos
#
cybersecurity
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government's activities known as HIDDEN COBRA.
Macos

Apple confirms that macOS and iOS are vulnerable to Meltdown bugs

Mon, 8th Jan 2018
#
ios
#
apple
#
meltdown
Security issues known as Meltdown and Spectre affect all modern processors, including Apple's Mac systems and iOS devices. No known exploits at this time.
Thinkstockphotos 877076702

Menlo Security closes $40m funding round to expand malware isolation tech

Wed, 13th Dec 2017
#
malware
#
cybersecurity
#
healthtech
Menlo Security has successfully closed a Series C funding round to the tune of US$40 million this week, bringing its total funding to $85 million.
Thinkstockphotos 823686906

Mobile security starts with a powerful AI-based scanning engine

Fri, 17th Nov 2017
#
wireless networks
#
ai
#
cybersecurity
This principal analyst from Camden Associates says the secret sauce to securing mobile users is AI-based zero packet inspection.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Thinkstockphotos 653938390

Threat actors embrace metadata as the underrated weapon in cyber war

Tue, 18th Jul 2017
#
data analytics
#
martech
#
planning
Metadata – the data that describes other data – is a security threat that goes underreported but is also a powerful threat to national security.
Digital isolation

Symantec acquires Israeli threat isolation startup

Mon, 10th Jul 2017
#
cybersecurity
#
symantec
#
partners
Symantec is acquiring Fireglass in a deal designed to strengthen its cyber defence platform and extend its secure web gateway and email protection.
Thinkstockphotos 607610284

NordVPN comments on the internet's 28th birthday: 'Why are we still being watched?'

Tue, 21st Mar 2017
#
vpns
#
surveillance
#
data privacy
As the internet marks its 28th year, NordVPN questions ongoing privacy breaches amidst global calls for better data control.
Thinkstockphotos 650071048

Bye bye, NPAPI: Mozilla issues critical update to Firefox, disables plugins

Fri, 10th Mar 2017
#
microsoft
#
mozilla
#
browsers
Firefox has disabled all NPAPI plugin capability except Flash. Common plugins such as Adobe Acrobat, Java and Microsoft Silverlight no longer load.
Thinkstockphotos 525318499

Check Point says beware of the Trident Exploits on iOS

Tue, 30th Aug 2016
#
malware
#
cybersecurity
#
apple
UAE activist targeted by 'Trident' - a trio of zero-day iOS exploits enabling total device control, discovered by Toronto researchers.
Thinkstockphotos 492729093

FLocker malware targeting Android smart TVs

Tue, 21st Jun 2016
#
malware
#
ransomware
#
digital entertainment
FLocker is the latest a malicious ransomware agent that is targeting smart TVs running the Android operating system, Norton reports.
Avg internet security 2011

Review: AVG Internet Security 2011

Wed, 1st Dec 2010
#
gaming
#
digital entertainment
#
avg technologies
AVG Internet Security 2011 thrives with real-time threat detection and social media safety, proving essential for secure web browsing.
Fallback

Clear and present danger

Fri, 1st Oct 2010
#
martech
#
adobe
#
notebook
Alert resellers know the boom in covert cyber criminal activity is forcing businesses to rethink the budgets they're allocating to security initiatives.