Security risk management: Kaspersky Labs identify cross-platform Java Bot used for DDoS attacks

Throughout much of 2013 Oracle and its programming language, Java, was rarely out of the news. However, since its Critical Patch Update (CPU) release in October 2013, things have remained relatively quiet. Until now, that is. Unfortunately Java-related security issues are once again making the headlines. Kaspersky Labs, have recently discovered more botnet malware designed …

Read More

Cyber security: 12 internet users worldwide fall victim to cyber criminals every second claims new report

What’s the likelihood of your business being attacked by cybercriminals? Well, according to a recent report from Russia’s Interior Ministry, the answer is probably more likely than you might have expected. What happens in Russia might not appear to be especially relevant to UK businesses, but the issue of cybercrime transcends national borders: cyber-criminality has …

Read More

Why does your organisation need to comply with the ISO 27001 standard?

It’s often stated that knowledge is power. In today’s digital world, however, it’s information that governs power and success, particularly in a business context.  Information is one of, if not the most, valuable assets that any business owns. Unfortunately whilst many organisations are practiced at gathering information, they are rather less adept at organising and …

Read More

Security risk management: EMC latest SBIC report offers recommendations to overhaul outdated and inadequate information security processes

The security division of EMC released its latest security report this week. The aim of EMC security division’s  latest Security for Business Innovation Council (SBIC) report is to provide guidance on how organisations can gain competitive advantage by transforming many of the outdated and inflexible IT security processes which govern the use and protection of information …

Read More

Nearly 100,000 travel insurance customer’s credit card details compromised in cyber-attack

2013 ended just as it had begun with yet another cyber-attack against a firm holding customer data. The personal and confidential information of thousands of Staysure customers was stolen by hackers. The cyber-attack saw the credit card details of nearly 100,000 travel insurance customers compromised. The travel insurance provider has revealed that card payment details …

Read More

Security risk management: Cyber-criminals will increasingly target mobile and BYO devices during 2014

Where will the biggest cyber security risks come from in 2014? Which new threats are businesses likely to face, and which vulnerabilities are most likely to be exploited by unscrupulous hackers? Well, according to security behemoth, McAfee, the major threat will come from ransomware – a type of malicious software that can be installed on …

Read More

Security risk management: ISF identifies the top 6 security risks for 2014

What are the top 6 security threats that will threaten business and enterprise in 2014? Well, according to the Information Security Forum (ISF), the world’s leading independent authority on cyber security and information risk management, the key threats are bring your own device (BYOD) trends in the workplace, data privacy in the cloud, brand reputational …

Read More

NatWest online services hit by cyber-attack

If ever proof were needed that hacking is still an ongoing and persistent threat and that every business needs to beef up its defences against cyber-attack, then the experiences of Royal Bank of Scotland Group should serve as a salutary lesson for every organisation. Already unpopular for numerous well-documented reasons, RBS and Nat West took …

Read More

Webinar – Secure and Accelerate Your Web Apps

Krypsys has a long pedigree as a leading European specialist in Barracuda’s WAF technology and we are applying this experience and expertise to help ADC customers. If you would like to find out how these solutions could help you protect and optimise your web applications, please feel free to attend this lunch-time webex event. Reserve a place on this Webex by using the booking form below. 

Webex scheduled for:-

  • Tue 8th July 2014 | 1:00pm – 1:40pm

Read More

Barracuda Load Balancer ADCs: the keystone to advanced application delivery platforms

What do you know about Application Delivery Controllers? If the answer is not very much, then it would appear that you’re in good company. A recent research report by Quocirca – “In demand: the culture of online service provision” highlighted this problem. The survey of 300 IT managers in the UK, Ireland and Nordic region, found …

Read More

Payment Processor Hacking – 1,295 Bitcoins Stolen

BIPS, based in Copenhagen, one of Europe’s largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is believed that a two-stage attack was employed – DDoS followed by hack – was employed. BIPS primary service is to allow merchants to take payment in bitcoins, and then exchange them …

Read More

Security risk management: Oracle releases bumper Critical Patch update for Java to combat hackers and malware writers

Oracle has finally released its Critical Patch Update (CPU) for October 2013, and for the first time ever has incorporated Java into the patch. Previously Oracle had released Java patches on a separate cycle every 4 months. The net effect of the all-inclusive patch is a massive update which aims to fix 120 flaws across …

Read More

Cyber-attacks are becoming increasingly costly: can your business really afford not to protect against itself against such attacks?

Have you ever wondered why network security testing is so vital? Maybe you think that having already spent a considerable sum on security precautions to prevent hacking, the cost of additional vulnerability assessments and penetration testing is a step too far. Whilst Krypsys’ security experts understand such concerns, we still believe that it always pays …

Read More

Adobe hacking: customer credit card details and Adobe source code stolen

Adobe is the latest big name to have been hacked. According to the company source code for numerous Adobe products including Acrobat and ColdFusion has been stolen, customer IDs and passwords have been accessed and card details for 2.9 million customers stolen in a sophisticated cyber-attack on its website. The breach was initially carried out …

Read More

Webinar – Lunch With a Pen Tester

Security measures are often designed and implemented from the perspective of the defender i.e. from the inside looking out. From this perspective, 90% secure may look effective. To an attacker or pen tester on the outside looking in, a 10% opportunity would look like an open door. Attend this lunch-time event and get the attackers …

Read More