If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

COMPUTING SECURITY AWARDS


COMPUTING SECURITY AWARDS

Just a reminder that you have until 30th September to cast your votes. The awards will be presented at an evening ceremony on 8th October. www.computingsecurityawards.co.uk



News


Partnership deal takes off

Etihad Airways and Okta announce strategic technology partnership

main headline

Privileged access management

WALLIX unveils new on-demand solution


Commitment to excellence recognised

Sims Recycling Solutions among first to be awarded top Industry Certification Standard

main headline

Students learn skills to fight cybercrime

Undergraduates are being equipped with the skills to fight computer hackers

main headline

Opening a window on Microsoft

Microsoft Windows 10 is likely to be an attractive target for cybercriminals, says one expert

main headline

Celestix Launches Virtual DirectAccess & AD FS Appliance Range

Celestix Now Offers Virtual Editions of Its Unified Remote Access and SSO Platforms to Enable Easy Deployment in Virtualized Environments


banner advert

Features


Fight is on against cybercrime onslaught

What is being done to protect our businesses from the cybercrime blitz they now face?

main headline

Protecting your digital identity

Digital services are expanding rapidly, making the chances of identity theft an ever greater reality.

main headline

Finding the key to Data Sovereignty

How ready are businesses for the massive changes that the upcoming EU Data Protection Regulations will bring?

main headline

Cybercrime plot set to thicken in UK

Cybercrime is now regarded as one of the fastest-growing industries. Ricky Knights, Cyberoam UK & Ireland channel manager, and Emma Morris, network security specialist, VCW Security, offer their thoughts



Opinions


Shadow IT – hassle and bliss for IT departments

‘Shadow IT’ divides companies, getting businesses off to a bad start, warns Roman Foeckl, CEO of CoSoSys

main headline

Proof, Not Promise! IT Asset Disposal, are you breaking the law?

Chris Littlewood, managing director, Ecosystems IT, asks why is it that organisations still break the law when it comes to IT Asset Disposal and Data Destruction.

main headline

banner advert

Exhibitions


Embrace a digital future!

Cyber Security Europe is returning to the ExCel LONDON in October — and promises to be bigger and better.

main headline

banner advert

White papers


How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

Welcome to the September 2015 Newsletter.
It was extremely worrying to see PandaLabs – Panda Security’s malware research laboratory –confirm a record increase in the creation of new malware samples in its latest report*, covering Q2 2015. In the second quarter of 2015 alone, there was an average of 230,000 new malware samples detected each day: a total of 21 million new types in those three months. Compared to the same period last year, where there were 160,000 registered samples, this is an increase of 43%. The majority of these samples are variants of known malware, mutated by cybercriminals to try to stop the antivirus laboratories from detecting the infections.

Who are the big offenders? Trojans continue to be the most common source of infection (71.16%), with 76.25% of users infected by this type of malware. Among the main threats the study investigated was the use of Cryptolocker and how cybercriminals have begun to reuse an old technique to infect users, one which was first seen 20 years ago. It involved infecting users via a macro in Office documents, especially Word. To complete this attack, the criminals included a blurred image that could only be seen if the user activated the macros. Once users do this, they are infected.

With cyber hackers looking at businesses as it is relatively easy target to steal information from, the security of an entire company is at risk, warns PandaLabs. For those who have yet to put the right levels of security in place right across their organisations, this might well be the time!


To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622