eCommerceNews UK - Technology news for digital commerce decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.

Stories by Sara - Page 27

Thinkstockphotos 534919271

New Panda Banker campaign targets Japan's financial institutions

Wed, 4th Apr 2018
#
breach prevention
#
ibm
#
fireeye
Popular banking malware Panda Banker, also known as PandaBot and Zeus Panda is reportedly targeting Japan's financial institutions for the first time.
Thinkstockphotos 940037718

Carbon Black launches tech partner program to improve collective security defences

Wed, 4th Apr 2018
#
siem
#
juniper networks
#
logrhythm
Carbon Black has launched a new technology partner program that is designed to improve cybersecurity through collective defence.
Device internet pixels 60504

With $2.5m in its pocket, local security firm Kasada sets its sights on the US

Tue, 3rd Apr 2018
#
bots
#
venture capital
#
kasada
Two Australian venture capital firms have raised $2.5 million for local cybersecurity firm Kasada, which will now set its sights on the US market.
Thinkstockphotos 483166983

Unisys teams up with Cylance to offer managed security services with endpoint protection

Thu, 29th Mar 2018
#
endpoint protection
#
ai security
#
edr
Unisys and Cylance partner to launch a global managed security service, combining endpoint protection with advanced AI and machine learning technologies.
Thinkstockphotos 136735104 ofghpej

Malicious 'bad bots' account for more web traffic than ever before

Wed, 28th Mar 2018
#
advanced persistent threat protection
#
cybersecurity
#
healthtech
4% of bad bot traffic is made up of moderate or sophisticated bots, which evade detection by distributing their attacks over multiple IP addresses.
Thinkstockphotos 817402648

Not quick enough: Most firms can't detect or contain a breach within one hour

Wed, 28th Mar 2018
#
siem
#
breach prevention
#
cybersecurity
New research from LogRhythm reveals that fewer than half of global organisations can detect a major cybersecurity breach within one hour.
Thinkstockphotos 77749523

Encryption firm Echoworx moves into 'underserved' Asia Pacific region

Tue, 27th Mar 2018
#
encryption
#
hyperscale
#
dc
Echoworx plans to bring encryption to the 'underserved' Asia Pacific market, starting with a data center in Australia.
Thinkstockphotos 684129726

GandCrab: The 'agile' ransomware that is updated in real time

Tue, 27th Mar 2018
#
malware
#
ransomware
#
encryption
The GandCrab ransomware has been making headlines recently for being one of the few malware strains that developers update in real time.
Thinkstockphotos 904150194

Malaysians urged to watch out for clickbait and 'fake news' as election season approaches

Tue, 27th Mar 2018
#
phishing
#
email security
#
elections
Quann Malaysia is warning Malaysians to be vigilant and watch for clickbait phishing links as the 14th Malaysian General Elections get closer.
Thinkstockphotos 817742672

RSA launches 'risk quantification' tools so CISOs can convince boards that security is important

Tue, 27th Mar 2018
#
risk & compliance
#
cybersecurity
#
rsa security
RSA has partnered with RiskLens to offer cyber risk assessment tools with its RSA Archer platform, helping CISOs communicate risk to their boards.
Thinkstockphotos 683716072

What happens when encryption and security certificates go awry?

Tue, 27th Mar 2018
#
encryption
#
key management
#
certificate expiry
Researchers at Carnegie Mellon University have warned that compromised certificates in a PKI environment can lead to data breaches.
Thinkstockphotos 187843938

Taiwan Cabinet to invest NT$11 billion for cybersecurity industry development

Mon, 26th Mar 2018
#
cybersecurity
#
government
The Executive Wan's Department of Cyber Security is developing an action plan for the industry's development, which includes cybersecurity management.
Thinkstockphotos 456090717

iPhone unlockers set a dangerous precedent for abuse, says security expert

Mon, 26th Mar 2018
#
encryption
#
apple
#
apple iphone
Apple's attempts to prevent iPhone unlocking have been circumvented by a third-party provider, potentially giving law enforcement access to sensitive data.
Thinkstockphotos 668344470

Google rolls out phishing prevention amongst new G Suite security features

Mon, 26th Mar 2018
#
mfa
#
phishing
#
email security
Updates include phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and more.
Thinkstockphotos 522489079

Businesses face 'cyber black holes' without complete visibility

Fri, 23rd Mar 2018
#
iot security
#
forescout technologies
#
network visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Billington award 5nm98d5

CSA chief David Koh recognised for contributions to Singapore's cybersecurity prowess

Thu, 22nd Mar 2018
#
cybersecurity
#
healthtech
#
csa
David Koh, chief of CSA, honoured with Billington CyberSecurity International Leadership Award for pioneering Singapore's cybersecurity advancements.
02c6c70605c7184998f5937f12efaba6

Five million Android devices possibly infected with 'aggressive' pre-installed adware

Wed, 21st Mar 2018
#
malware
#
supply chain
#
cybersecurity
Nearly five million Android devices may have pre-installed 'RottenSys' adware, researchers reveal, implicating distributors in the alarming spread.
Thinkstockphotos 667050642

A chatbot for network security management? It's a reality

Wed, 21st Mar 2018
#
uc
#
network infrastructure
#
sdn
In what may be an industry-first, a UK-based company has launched an intelligent chatbot especially designed for network security management tasks.
Hid

You're invited: Witness the evolution of workplace optimisation exclusively with HID Global

Wed, 21st Mar 2018
#
physical security
#
workplace
#
hid global
Join HID Global at Brisbane Powerhouse on 28 March for an exclusive preview of their state-of-the-art HID Workplace Optimization platform.
Thinkstockphotos stk140332rke

Businesses confident about their 'cyber resilience' - but 77% don't have an incident response plan

Mon, 19th Mar 2018
#
breach prevention
#
cybersecurity
#
ibm
Most organisations lack a formal cybersecurity incident response plan, but feel more cyber resilient than last year, according to a study by IBM and Ponemon.