Mobile fraud is increasing, attack rates rising 24% year-over-year

ThreatMetrix released new cybercrime insights from the first half of 2018, revealing a sharp rise in fraud attack levels on mobile transactions. As consumer behavior increasingly embraces mobile for virtually all online goods and services, fraudsters are starting to close the gap on this channel. Mobile becomes the go-to digital channel The rise of mobile…

What is an RDP attack? 7 tips for mitigating your exposure

Microsoft’s Remote Desktop Protocol (RDP) is used for remotely connecting to Windows systems. In an RDP attack, criminals look for unsecured RDP services to exploit and access enterprise networks. It’s frighteningly easy to do so because many organizations fail to secure RDP services against improper access. Over the past year, RDP has become the top…

Banking Trojan attacks increase, large scale Ramnit campaign impacts organizations worldwide

Check Point revealed a significant increase in attacks using the Ramnit banking trojan. Ramnit has doubled its global impact over the past few months, driven by a large scale campaign that has been converting victim’s machines into malicious proxy servers. During August 2018, Ramnit became the most prevalent banking Trojan in an upward trend in…

How internal dysfunction puts your network at risk

IDG polled 200 network and cybersecurity professionals across the U.S. & Canada, and found almost inevitable consequences for organizations where network and cybersecurity teams have conflicting objectives, are managed in a siloed way, and have unequal or incomplete network visibility. 86% of respondents admitted to experiencing at least one of the following due to a…

Android September 2018 Patches Fix Critical Flaws

The September 2018 Android Security Bulletin is split into two parts, the 2018-09-01 security patch level, which resolves 24 bugs, and the 2018-09-05 security patch level, which addresses a total of 35 bugs. Five of the vulnerabilities patched with the 2018-09-01 security patch level were rated Critical severity. Three of these are elevation of privilege…

APIs: The Trojan horses of security

At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint unsecured means an application programming interface (API) can serve as a gateway to the data centre by which attackers can effectively attack the backend via bots, and compromised or impersonating applications. With…