Aug 23, 2018

Ryuk ransomware demands massive Bitcoin ransom

The ransom varies from 15 to 50 BTC, and has already netted the attackers more than $640 000, says Check Point.

Jul 5, 2018

Security breach puts Liberty at risk: Redstor

Having a secure off-site copy of all data as a backup will ensure an organisation can recover from an attack and help prevent data loss, says Redstor.

Jun 27, 2018

Are you protected from a possible ransomware attack?

Kevin Leahy, group general manager, data centres, at Dimension Data, says that businesses should rethink their approach to back up and recovery in the light of ransomware.


Data breaches vs ransomware: what's the difference?

New-generation endpoint technology both hardens protection and enables full visibility of endpoint processes, says Panda Security.


Cyber security: no longer just 'an IT problem'

Cyber risk ultimately poses a threat to the balance sheet, but brand damage and a threat to confidence is what should be on every business leader's mind, says Goldphish.

Jun 22, 2018

Ransomware's reach expands

Prevention is far better than cure, because there is no real cure, says Mark Thomas, group CTO Cyber Security at Dimension Data.

Jun 20, 2018

Fileless, zero-footprint cyber attacks on the rise

Malware authors are adding coin mining features to their tools, even if the primary aim isn't coin mining, according to Morphisec Threat Report.

Jun 18, 2018

Next-generation authentication

Blue Label Telecoms has adopted a multi-factor authentication and identity security platform solution from iCrypto.

Jun 18, 2018

Managing data security threats

Devon Helms says prevention may fend off some threats in advance, but the best defence against malware and ransomware boils down to following security best practices, especially for backing up data.

Jun 17, 2018

Liberty CEO labels hack criminal act

David Munro says the company is in full control of its IT systems, and notes the safety and security of customers' information remains top priority.

Jun 16, 2018

Liberty's IT infrastructure compromised

The investment group tells customers that an external party has gained unauthorised access to its systems and requested compensation.

Jun 14, 2018

Infographic: How to fight ransomware

Successful ransomware attacks exploit vulnerabilities in operating systems.