CISO Outlook articles

Twitter Fixes Bug that lets Unauthorized Apps Get Access to Direct Messages

Twitter Fixes Bug that lets Unauthorized Apps Get Access to Direct Messages

Back in 2013, the OAuth keys and secrets that official Twitter apps use to access users’ Twitter accounts were disclosed in a post to Github… a leak that meant that authors didn’t need to get their app approved by Twitter to access the Twitter API. Years later, the chickens are still coming home to roost:

Thanksgiving Day Botnet: November 2018’s Most Wanted Malware

Check Point’s latest Global Threat Index reveals the Emotet botnet rising up the top malware list in November as a result of multiple campaigns; Coinhive remains at top position for 12th consecutive month. Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the

Online Shoppers More Vulnerable to SPAM as the Holidays Inch Closer

New research from cyber security provider F-Secure points to spam as an attack vector to watch out for this holiday season. Spam campaigns disguised as delivery notifications or online shopping invoices have been popular with cyber criminals all year long, and researchers say these tactics can prove even more effective around the holidays. F-Secure’s research

Cybersecurity Threats can Cost an Average of US$10.3 million to Organisations

A Frost & Sullivan study commissioned by Microsoft reveals that a large-sized organization in India incurs an average of US$10.3 million of economic loss from cyber attacks whereas a mid-sized organization incurs an average of US$11K. Cybersecurity attacks have also resulted in job losses across different functions in more than three in five (64%) organizations

Symantec Unveils Neural Network to Protect Critical Infrastructure From Cyber Warfare

Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology Symantec today introduced Industrial Control System Protection (ICSP) Neural, the industry’s first neural network-integrated USB scanning station that helps organizations protect critical infrastructure by preventing the devastating physical consequences of cyber-attacks on operational technology (OT). OT

Organisations in India are Dedicating More Budget to Cybersecurity

Despite increased spending, Palo Alto Networks study revealed 41 per cent of companies in India have lost over 64 lakhs in the current financial year. Palo Alto Networks, the next-generation security company, today announced the results of its report entitled ‘The State of Cybersecurity in Asia-Pacific’, which revealed that cybersecurity budgets have increased for 92

Fortinet Report Unveils Advanced Methods Adopted By Cyber Criminals

Fortinet recently announced the findings of its latest Global Threat Landscape Report covering Q4 2016. The research reveals that 50% of malware exploits in India occurred in the last 3 months of 2016. With India moving towards a cashless digital economy the last two weeks in December, 2016 recorded a very high level of threat

Multiple Smart Components Are Vulnerable to Cyber Attacks

Kaspersky Lab researchers examined a number of digital kiosks and interactive terminals used in modern cities for different purposes – from paying for different services through to entertainment – and discovered that a lot of them contain vulnerabilities that can expose private user data and be used to spy or spread malicious code. Along with

Delving Deeper to Understand A Cyber Attack

Considering the growing number of advanced cyber attacks, cyber security experts advise CIOs in Asia Pacific to analyse and understand the different phases of a cyber-attack to build better cyber defences in their corporate network. In the past, it was much easier for firewalls to detect significant threats to the network. This was because traffic

Passwords continue to be a security problem

Ten CISOs from across industries have predicted that the days are numbered for the password as the sole authentication method. They see enterprises moving to augment or supplant the traditional password with advanced technologies, such as biometrics. Security Current, an information and collaboration company, talked with various CISOs to find that they agree that passwords

Top