Facebook iconTwitter icon
B2B-Network:
Latest Articles
Trend
How To Improve Accountability For Cyberattacks
Gfx084

Almost all organisations nowadays have taken steps to prevent cyberattacks. The final responsibility for ensuring that confidential information is secure rests with managers. When a serious CyberA occurs, most people rush to protect their reputation from harm. 

In order to be completely free from blame when a cyberattack occurs, companies must take responsible steps to manage the damage from an unfortunate event. This applies to everyone involved in the process, from security teams to management. All stakeholders must fully understand the risks that develop daily. Plans must be in...

» Read more
Inside Story
Dropbox scandal: 68 million passwords for sale on dark web?
Untitled 19

This could be worrying for all Dropbox users; if that includes you, make sure to change your password as soon as you finish reading this article. Even if you're not a Dropbox user, there are some important lessons to be noted about on-line security.

 

Dropbox: A titanic security breach

Recently (August 31st, 2016) news surfaced about a massive security breach that involved as many as 68 million passwords – all of which are reportedly for sale on the dark web marketplace "TheRealDeal" by someone calling themselves "DoubleFlag", for 2 Bitcoin (worth just...

» Read more
Inside Story
Pegasus: the malware that turns an iOS device into a surveillance tool
6

Following investigation into two suspicious text messages received by well-known human rights activist Ahmed Mansoor, the latter half of August has seen widespread alarm and swift action by Apple to limit the effects of sophisticated malware known as Pegasus. Simply opening a link in the text messages can install spyware on the phone which would allow instigators to download data and, more eerily, listen in on communications. By using the phone’s own camera and microphone, tracking whereabouts and recording calls and messages, a mobile phone could allow outsiders to spy on personal...

» Read more
Product Information
What You Need To Know About LOGICnow
Open uri20150512 262482 14gr8ki

LOGICnow is a multi-device, IT service management platform. It's basic functionality is to provide IT users with means of linking up their various IT needs under one single management platform. This means a business can handle it's email systems, payment systems, planning and logistics systems all under one program that works both onsite and offsite, on mobile devices as well as standard computing hardware.

 

The Benefits

The benefits with LOGICnow are much the same as with any IT service management platform. It provides a shared system that can be logged onto by any employee,...

» Read more
Product Information
Could Rapid7 Nexpose Series be the solution to the IT-Security?
Gfx009

Rapid7 engineers better IT security with innovative and simple solutions for most critical issues. According to Rapid7, their analytic solutions carefully analyse, contextualize and correlate the security data you need to detect a compromise and reduce threat exposure. Besides, the security data generates specific information that will help your organization improve system security. They also allow visibility of the content of your network as well as assets and offer information on vulnerabilities and prevalent threats to your organization.

Rapid7 Nexpose series is a product that has...

» Read more
Test
Network security with SAINT
1

The SAINT Security Suite is a clever piece of software allowing you to see your network's vulnerability, all for a very affordable price. You can buy the software as a standalone package or as part of a piece of hardware that's been previously configured. Saint can be used to scan, thanks to the integration of SAINTexploit, as well as to manage your network, or a combination of these functions together. It's ideal for complicated networks and has a user-friendly interface, allowing an administrator to carry out auditing tasks to ensure total network compliance.

When SAINTbox...

» Read more
Inside Story
Twitter Hacked? Password Reset Conundrum
Gfx084

Twitter has denied server hacking caused it to force millions of users to reset passwords. The company states that more than 32 million user accounts were locked because they had been subject to theft by a variety of methods. 

The dark web information upload of 32 million Twitter user accounts details, including passwords, user names and email addresses has raised concerns about the security of the company's servers and an investigation is underway to ascertain just when and how the information was amassed. 

Twitter says the amalgamation of data feel that a breach of this...

» Read more
Inside Story
Malware Attack on Facebook Users through Google Chrome
Iot header

Malware attacks on Facebook are not uncommon, especially given the popularity of the site. The current attack is on Facebook users using Google Chrome. What happens is that a Facebook user is scammed into downloading the malware through a notification. The comment tagging feature of the social site is what acts as a carrier for the malware. A user gets a notification of a comment tag from a “friend” in their email or on the app and when the link is clicked, the malware downloads. If a user goes as far as to click the downloaded link, the malware infects the device. The problem...

» Read more
Trend
Cerber Ransomware - Holding Your Personal Files To Ransom
Gfx028

Stories about Cerber Ransomware have been cropping up all over the internet, and for good reason. This is a piece of ransomware developed to hold personal files at ransom and even has the capability to create fake system alerts and speak in a robotic voice to its victims. The Cerber Ransomware is capable of encrypting personal files, such as photos, documents and other private information. Once files have been encrypted, the ransomware will speak to those that fall victim to it, stating that their files have been encrypted. 

The Ransom
Those who fall victim to this scam will then be...

» Read more
Product Information
The benefits of eScan antivirus software
Untitled 1

If you want to save your computer from viruses, an active anti-virus software is essential. A tried-and-tested anti-virus that offers a good balance of features and performance is eScan. This software has proven to be effective in detecting and removing malware, spyware, and many other viruses. 

When experts recently tested eScan, they found that it did well against widespread spyware and had no false detections. AV-Comparatives awarded this program for its excellent performance in detecting malicious files. 

Most anti-virus programs use firewall to stop network attacks,...

» Read more

<< Older posts
Loader