News

May, 2013


05/03  Australia ramping up cybersecurity defense

05/02  When passwords are the problem

05/01  Federal cybersecurity standards undergo revisions

April, 2013


04/30  The rise of mobile malware

04/30  More financial institutions targeted in DDoS cyberattacks

04/29  Cybersecurity bill stalls in Senate

04/29  Phishing increasingly dominant, dangerous cyberattack

04/29  Vulnerabilities detected in industrial terminals

04/29  The cybersecurity National Guard?

04/26  Arrest made in largest-ever DDoS attack

04/26  Encryption essential to BYOD security

04/26  Cloud security still working out the kinks

04/25  Is Shodan putting your computer security at risk?

04/25  Computer security and counterfeit software still don't mix

04/24  South Korea looks to boost cybersecurity

04/24  Computer security at risk while laws play catch-up

04/23  Cybercriminals target small businesses

04/22  U.S. address China cybersecurity threat

04/22  Cybersecurity at the forefront of political debate

04/19  Startups at risk for data breaches

04/18  The future of cybersecurity for law firms

04/17  Cyberattack traced to North Korea

04/16  Cyberthreats loom for small businesses

04/15  More encryption needed in Healthcare IT

04/12  Cybercrime syndicate targets video game companies

04/11  Government zeroes in on cybersecurity

04/10  The UK takes on cybercrime

04/09  Asia-Pacific region not ready for security compliance

04/08  Taking on the challenges of cybersecurity

04/03  Unprecedented cyberattack affects global internet functionality

04/02  Mobile devices a cybersecurity liability for government networks

04/01  Cybersecurity should be a major focus for ecommerce

March, 2013


03/30  Online security linked to consumer, company behavior

03/29  Cybercriminals targeting retail industry

03/29  The cyberthreats of today

03/29  Japan launches cybercrime task force

03/29  Compliance does not always translate to effective security

03/29  Expert identifies challenges in encryption implementation

03/28  FBI makes monitoring email a top security priority

03/28  Protecting mobile devices against security threats

03/27  Adoption of data encryption on the rise

03/26  Cybercrime strikes small businesses

03/26  Vatican Twitter account thought to be hacked

03/25  Encryption policies lacking in the healthcare industry

03/22   Retail sales increase highlights need for payment security

03/21  Researchers analyze the global SSL market

03/20   Application vulnerabilities ranked highest risk among security professionals

03/20   SSL co-creator offers thoughts on encryption and its future role in computer security

03/18  Elaborate Trojans aimed at financial industry

03/15  CASC finds SSL security remains rock solid

03/14  New research findings will make SSL stronger

03/13  Data breaches prompt healthcare industry to take action

03/12  At what cost should software be secure?

03/11  Strong passwords and cryptographic tools important security solutions

03/08  Virtualization, BYOD prompt more investments in cybersecurity

03/07  New malware utilizes PACs to hijack web browsers

03/06  Awareness of keys, certificates, critical to keeping data safe

03/05  More municipalities adopting encryption security standards

03/04  Growth in SMS malware attacks take advantage of smartphone users

03/01  Big data breach to state dept still unpatched, no encryption the cause

February, 2013


02/28  Cryptography, authentication, hot topics among experts

02/27  Practical ways for SMBs to safeguard data

02/26  Business leaders taking encryption seriously

02/26  Outdated equipment, lack of compliance, mobile puts PCI at risk

02/26  Canadian official warns of encryption lapses

02/25  OCSP stapling procedures increase network security and speed

02/25  Report: Global EV SSL to grow 50 percent by 2015

02/22  Infrastructure operations reported to be high risk cybersecurity targets

02/22  Identity theft on the rise, merchants and banks hardest hit

02/21  White House turns attention to cybersecurity

02/21  Trust breach in computer security estimated at $400 million

02/20  Cryptography experts gather to discuss cybersecurity

02/20  Encryption discovery could lead to advancements in cybersecurity

02/15  Zero-day exploit response time varies by OS

02/15  E-commerce, retailers, top cyberattack targets

02/14  Europol takes down cybercriminal ring

02/14  13 percent of home networks infected with malware in 2012

02/13  Wireless on the front lines in computer security war

02/12  27 Million new forms of malware identified in 2012

02/11  New banking malware threat identified

02/08  Government officials warn of growing cyberthreats

02/08  Security professionals celebrate Safer Internet Day 2013

02/07  Joint operation takes down botnet

02/06  Securing healthcare networks begins with encryption

02/06  OWASP identifies top 10 website security vulnerabilities

02/05  Report reveals website security gaps

02/04  Companies should utilize more encryption techniques

02/01  Expert says cybersecurity gaining traction in the Middle East

02/01  MAM tool integrates security into software code

January, 2013


01/31  Expert outlines tips for boosting critical infrastructure security

01/31  Cross-site scripting threats surged in Q4 2012

01/30  Google announces Pwnium 3

01/30  DOD plans to increase cybersecurity force

01/29  Organizations underestimate the value of encryption

01/28  DDoS attacks the result of compromised websites

01/25  Expert outlines IT security predictions for 2013

01/24  Experts highlight encryption for protecting health data

01/24  Apple, Android emphasize the importance of code signing certificates

01/23  Google enables SSL search for all users

01/23  Businesses struggle with data governance, PCI compliance

01/22  Virut botnet domains taken down

01/21  Governments renew urgency for cybersecurity improvements

01/18  Researchers analyze hacking incidents, business cybersecurity standings

01/18  Yahoo allows for SSL encryption

01/18  Retailer overhauls web server security with tokenization and SSL

01/17  SSL protection essential for cloud security

01/16  Keeping up with PCI compliance

01/15  Improving data center design with old tools and new approaches

01/14  ICS-CERT reviews computer security incidents of 2012

01/11  Website security threat trends of 2012

01/10  Research finds lack of visibility over sensitive data

01/10  IT salaries on the rise

01/09  Researchers analyze the organizational structure of cybercrime syndicates

01/08  UK Businesses lack BYOD safeguards, researchers say

01/07  Healthcare industry spends more on data security

01/04  Big data in healthcare: Worth the risk?

01/03  IT security appliance market momentum slows

01/02  FBI takes down international cybercrime group

December, 2012


12/31  Federal agencies call for standardized BYOD practices

12/31  White House publishes roadmap for information sharing

12/28  Researchers find end of the world malware

12/27  Detroit becomes next open source wireless network proving ground

12/26  Zscaler releases SSL security extension for Internet Explorer

12/26  Survey finds high level of confidence in cloud technology

12/24  Website security revealed as major concern for consumers

12/24  Researchers highlight need for more comprehensive BYOD strategies

12/21  SANS Institute announces computer security training event

12/20  Microsoft makes cybersecurity predictions for 2013

12/20  Dexter malware targets point-of-sale systems

12/19  New wave of DDoS attacks reveals website security gaps

12/19  Evolving technologies leave skills gap, IBM says

12/18  BYOD: Considering end-user needs

12/18  Expert identifies IT security trends for 2013

12/17  Healthcare slow to make progress in cybersecurity

12/14  Data security gaps found as a result of big data

12/14  Security researcher develops new password-cracking cluster

12/13  Eurograbber malware bypasses SMS authentication

12/12  Cybersecurity revealed as top concern for business decision makers

12/11  Majority of healthcare organizations victimized by data breaches, study finds

12/11  Experts identify growing risk of advanced cyberattacks

12/07  Cloud security no longer a prominent concern, survey finds

12/06  Researchers find many organizations out of PCI compliance

12/04  Cloud browser exploit allows free, large-scale computation

12/03  2012: Year of the data breach, privacy commissioner says

November, 2012


11/30  Open source proliferation spans many industries

11/29  New malware undetected by most antivirus programs

11/29  Microsoft plans for the future of big data

11/28  Experts highlight risk management tips

11/28  Project Cyber Monday 3 shuts down counterfeit domains

11/27  Organizations need better user access control policies, research says

11/26  IT's role in mitigating risk

11/21  Contracts hold the keys to cloud security

11/20  US government requires a more comprehensive security strategy

11/20  Facebook uses SSL encryption by default

11/19  EU organizations struggle to meet data privacy standards

11/19  Holiday shopping raises BYOD concerns

11/16  Executives discuss cloud security

11/15  Researchers predict top cyberthreats for 2013

11/15  Website glitch exposes utility company's customer data

11/14  Information security and risk management must come together

11/14  Experts weigh in on cloud security

11/13  Stuxnet resurfaces in the US

11/13  Federal agencies call for cybersecurity information sharing

11/12  Windows 8 and its BYOD implications

11/09  Brick-and-mortar stores going online for the holidays

11/08  The cloud's impact on open source

11/07  Security manager highlights growing risk of ransomware

11/06  Cybercriminals leverage US election news to target victims

11/05  Healthcare CISO calls for better data security

11/01  Website security threats on the rise this holiday season

October, 2012


10/31  Contractor arrested for hacking Canadian government website

10/30  Survey highlights need for email encryption

10/26  Windows 8 boosts hardware security

10/25  Mobile technology offers user authentication advantages

10/25  Businesses need to prepare for the online shopping rush

10/24  Compromised systems at Fortune 500 companies for sale

10/24  Confidence in open source security solutions rising

10/23  Researcher demonstrates pacemaker hack

10/23  Big data enhances computer security

10/19  Information security analyst highlights effective practices

10/18  Survey finds BYOD adoption rising, but security concerns remain

10/17  Web API utilized for social engineering

10/17  Security researchers identify another Flame-like program

10/16  A third of fraudulent transactions originate from victims' computers

10/12  Etsy announces security upgrades

10/11  Java recognized as top programming language for financial software

10/10  Researchers identify 'waterhole' spear-phishing tactic

10/09  Tech industry places higher value on open source

10/09  GhostShell hacks top-ranked universities

10/08  SHA-3 encryption contest winner selected

10/05  Google warns users of state-sponsored attacks

10/04  FTC charges scareware ring with $163 million fine

10/03  Twitter security flaw reveals emerging social media black market

10/02  US government targeted by spear-phishing attacks

10/01  Attacks against US banks more sophisticated than typical hacktivist threats

September, 2012


09/28  GAO warns of mobile malware

09/28  Cybercriminals may be crowdsourcing DDoS attacks

09/27  Many organizations not prepared for social media threats

09/27  Expert says no need for new hash algorithm

09/26  Organizations slow to craft BYOD policies

09/26  FBI warns financial institutions of increased cybercriminal activity

09/25  Threat report identifies most common cyberattacks

09/24  Mobile carriers vulnerable to web exploit

09/24  Research into Flame virus reveals similar programs

09/21  Phishing attacks on the rise, victims not aware of security breaches

09/21  Organizations not protected against common web threats

09/21  Laptop thief publishes students' SSNs

09/20  Microsoft fights out-of-the-box botnets

09/19  Mitigating data breaches in a connected world

09/18  Cybersecurity myths lead to protection gaps

09/18  Experts question the effectiveness of Obama's cybersecurity order

09/17  Blackhole update released

09/14  Social media scammers deploy malicious browser plugins

09/13  October is cybersecurity awareness month

09/13  Most common threat discovery methods are ineffective for mitigating risk

09/12  Experts identify most common types of cybercrime

09/11  Microsoft updates encryption requirements

09/11  Mobile security concerns rise with increased device use

09/10  Experts say web application security is an ongoing process

09/07  Governments due for an SSL upgrade

09/06  Australian organizations get an 'A' on encryption

09/05  AntiSec steals 12 million UDIDs

09/04  Kerala issues cybersecurity guidelines for government ministries

August, 2012


08/31  Microsoft pushes for better encryption standards

08/31  President Obama urged to issue cybersecurity order

08/30  Mountain Lion makes encryption easier

08/30  HHS Stage 2 rule highlights the importance of encryption

08/24  Bugged McAfee update leaves users vulnerable

08/23  Mobile devices: A critical battleground for cybersecurity

08/22  Experts say cybersecurity is a 'way of thinking' problem

08/21  Microsoft highlights benefits of IIS 8.0

08/21  NIST to publish updated encryption guidelines

08/20  WikiLeaks targeted by DDOS attacks

08/20  Cybersecurity legislation failures may be due to a lack of expertise

08/17  Blizzard's Battle.net hacked, user login data compromised

08/16  NIST publishes guidelines for SSL security

08/15  Google praised for security, but pays the FTC for privacy violations

08/14  Survey: 50 percent of organizations subject to cyber attacks

08/10  Big data needed to improve cybersecurity

08/09  Report: Applications attacked 120 times per year

08/09  Hackers target Java and other third-party applications

08/08  EPA security breach: Part of a larger trend

08/07  Yahoo sued over password leak

08/06  Expert says good security will naturally lead to PCI compliance

08/06  Pentagon staff busted for pornography at work

08/03  Black Hat researchers reveal htaccess exploit

July, 2012


07/31  Microsoft changes encryption practices in response to Flame

07/31  Fraudsters target Olympics fans

07/30  Web-connected industrial control systems open to attack

07/27  Citadel scams lack grammatical finesse

07/26  Experts say Java exploits becoming more common

07/25  Malware in the Middle East

07/25  Microsoft utilizes technology from BlueHat finalist

07/24  Mozilla announces security improvements in Firefox 14

07/23  Report: Record-breaking number of phishing websites

07/23  World's third largest botnet taken down

07/20  Android malware tracks users' locations

07/20  Government bust seizes 70 websites

07/19  Open source: Crucial to Big Data, the cloud and cyber defense

07/19  SSL pulse identifies state of website security

07/18  Yahoo falls flat on password security

07/17  Android forum community: Another security breach

07/16  Microsoft July 2012 security bulletins released

07/13  Businesses struggle with managing firewalls

07/13  Microsoft confirms plans to patch MSXML vulnerability

07/13  Apple or Mac? New malware doesn't care

07/11  Open source model ramping up in many industries

07/10  Malware? There's an app for that

07/09  Many users affected by DNSChanger malware

07/02  Social engineer hackers target South Africa

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +27 21 819 2200
Fax: +27 21 819 2950