About Sara
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.
Stories by Sara - Page 39
Android 'Toast' overlay vulnerability affects all versions prior to 8.0
Mon, 11th Sep 2017
#
security vulnerabilities
#
cyber attacks
#
technology gifts
Android users are being urged to apply any security patches for their devices, after security researchers discovered a 'high severity' vulnerability.
Why IT security is a critical part of every learning environment
Mon, 11th Sep 2017
#
edutech
#
firewalls
#
network infrastructure
Many educational institutions lack a plan to manage the security risks posed by the hundreds of devices connected to their networks, according to Wavelink.
State-sponsored election hacks are acts of cyber warfare - survey
Mon, 11th Sep 2017
#
elections
#
venafi
#
security vulnerabilities
78% of respondents said they would deem an act as cyber war if a nation-state was behind a successful or attempted hack of another country's election.
Researchers dissect 10-year-old Snowball malware
Fri, 8th Sep 2017
#
malware
#
firewalls
#
network infrastructure
Previous samples of Snowball malware dated back to 2011, researchers at Palo Alto Networks' Unit 42 have discovered a sample with a timestamp of 2007.
'Good lessons' arise from Singapore business continuity test
Wed, 6th Sep 2017
#
uc
#
dr
#
cloud services
Singapore's financial sector conducted a massive business continuity exercise in order to test response to both cyber and physical attacks last month.
Beyond AV Tour hits Auckland & Wellington
Tue, 5th Sep 2017
#
breach prevention
#
ai
#
cybersecurity
Most cyber breaches are caused by non-malware attacks. Those attacks can't be prevented by technologies like machine-learning AV and traditional AV.
US judge squashes Yahoo's attempt to stop data breach lawsuits
Tue, 5th Sep 2017
#
hyperscale
#
public cloud
#
breach prevention
Both Yahoo and victims of its multiple data breaches have been granted – and denied – the ability to dismiss lawsuits after its massive data breaches.
HoeflerText remote access Trojan goes after Chrome users
Mon, 4th Sep 2017
#
firewalls
#
network infrastructure
#
network security
Chrome users beware: A crafty 'HoeflerText' scam deploys a NetSupport Manager RAT, broadening the arsenal of the notorious EITest campaign.
$500,000 zero-day prize pool for Mobile Pwn2Own contest in Japan
Fri, 1st Sep 2017
#
trend micro
#
zero day malware
#
security vulnerabilities
Trend Micro has put more than US$500,000 towards a prize pool that aims to find security vulnerabilities at the upcoming Mobile Pwn2Own contest.
Darktrace joins UK Prime Minister on trade mission to Japan
Thu, 31st Aug 2017
#
ai security
#
ai
#
security intelligence
Darktrace EMEA CEO Poppy Gustafsson is one of a select group of business leaders accompanying UK Prime Minister on a trade mission to Japan.
VeloCloud expands SD-WAN partner ecosystem; signs up major security firms
Wed, 30th Aug 2017
#
network infrastructure
#
sd-wan
#
sdn
The VeloCloud SD-WAN Security Technology Partner Program has recently signed on heavyweights such as Forcepoint Symantec and VMware.
Industry collaboration brings down WireX Android botnet
Tue, 29th Aug 2017
#
ddos
#
akamai
#
riskiq
Industry collaboration led to the successful takedown of the WireX botnet just three weeks after it appeared in August.
Interview: Sophos reveals the criminal underbelly of the dark web
Tue, 29th Aug 2017
#
malware
#
firewalls
#
network infrastructure
The dark web may be a place that most of us have heard of as a murky underworld for cybercriminals, but also where most internet users daren't tread.
Mobile malware creation is now as easy as downloading an app
Mon, 28th Aug 2017
#
malware
#
ransomware
#
cybersecurity
Mobile malware creation is as easy as downloading an app and potential criminals don't even need to write a single line of code.
Spammers' work cycles: Mon-Fri with lazy weekends, says IBM X-Force
Mon, 28th Aug 2017
#
malware
#
cybersecurity
#
spam
Attackers using tools such as Dridex and Qakbot spam employees through malicious mail at times when victims are most likely to open all incoming mail.
Hackers speak: Privileged accounts best way to steal data
Fri, 25th Aug 2017
#
endpoint protection
#
pam
#
edr
From the mouths of the hackers themselves, organisations' privileged accounts are the most attractive targets for gaining access to critical data.
IoT and BYOD still putting firms in the face of danger
Thu, 24th Aug 2017
#
iot
#
byod
#
empired
As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks.
It's possible for cyber attackers to change what's in your emails
Thu, 24th Aug 2017
#
email
#
mimecast
#
hacking
A newly-discovered exploit called ROPEMAKER allows an attacker to remotely change the content of any email post-delivery.
Two of ISACA's top cybersecurity courses are now available on-demand
Thu, 24th Aug 2017
#
risk & compliance
#
cybersecurity
#
education, learning & training
ISACA launches on-demand cybersecurity courses, enhancing IT pros' skill development and career progression in a flexible format.
Upside-down flag prompts hack against Malaysian websites
Tue, 22nd Aug 2017
#
ddos
#
hacking
#
cyber attacks
Malaysian websites have been hit by hacks and DDoS attacks reportedly in response to an error in the Kuala Lumpur SEA Games 2017 booklet.