eCommerceNews UK - Technology news for digital commerce decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.

Stories by Sara - Page 40

Thinkstockphotos 475253187

Foxit acknowledges zero-days in its PDF software, but no patches yet

Mon, 21st Aug 2017
#
pdf
#
zero day malware
#
foxit
Two zero-day vulnerabilities in Foxit Reader and PhantomPDF can allow attackers to execute malicious code on startup. Safe Reading Mode is recommended.
Thinkstockphotos 831742026

ESET reveals what to watch out for before you buy encryption

Mon, 21st Aug 2017
#
malware
#
data protection
#
encryption
Encryption services are becoming a focus for organisations and decision makers as new data protection laws such as the GDPR come into effect.
Thinkstockphotos 503554754

Turla threat group targets G20 Summit attendees

Mon, 21st Aug 2017
#
advanced persistent threat protection
#
threat intelligence
#
proofpoint
Participants in this year's G20 Summit in Germany are being targeted in a new wave of malware droppers, suspected to be from APT group Turla.
Thinkstockphotos 494814218

AV-Comparatives recognises ESET Mac & parental control solutions in latest testing round

Thu, 17th Aug 2017
#
malware
#
apm
#
cybersecurity
ESET's Mac Security and online child protection products have been officially certified by security software testers AV-Comparatives this week.
Thinkstockphotos 482087868

Attacker goes after Chrome extensions to spread malvertising & spam

Thu, 17th Aug 2017
#
google
#
proofpoint
#
phishme
Researchers from Proofpoint have discovered evidence of hacked extensions on the Google Chrome browser that were used to steal account credentials.
Thinkstockphotos 831619104

Webroot takes over Securecast in move to take cyber awareness training to mass market

Wed, 16th Aug 2017
#
phishing
#
email security
#
ai security
Webroot has officially acquired security awareness training platform Securecast and has plans to take the new integrated solution to the mass market.
Thinkstockphotos 483510067

AWS launches 'Macie', its newest machine learning security service

Wed, 16th Aug 2017
#
data protection
#
hyperscale
#
public cloud
Amazon Web Services (AWS) has welcomed the newest addition to its portfolio, a machine learning security service called Amazon Macie.
Thinkstockphotos 521744431

Hyundai Mobis creates NFC-based smartkey for vehicles: Encryption & authentication at the core

Tue, 15th Aug 2017
#
encryption
#
mfa
#
iam
Encryption and authentication technologies are able to encrypt data between the vehicle and smartphone; as well as accurately identify the requests.
Thinkstockphotos 504923274

How your online dating profile can be traced back to your workplace

Tue, 15th Aug 2017
#
phishing
#
email security
#
trend micro
Online dating apps can go beyond the world of personal matchmaking and be used at weapons for cyber attacks against corporate organisations.
Thinkstockphotos 513818650

NTT Security sets sights on South Africa as part of new EMEA strategy

Mon, 14th Aug 2017
#
mssp
#
trojan
#
ntt security
NTT Security has shuffled its senior management team for EMEA as it refreshes its approach to managed security services in South Africa and Europe.
Dsc 2582 0

Bank Negara Malaysia & AFI take focused look at financial risk in cybersecurity

Mon, 14th Aug 2017
#
risk & compliance
#
cybersecurity
#
bank negara malaysia
August kicked off with a hard look at Malaysia's cybersecurity strategy, thanks to a policy forum around security and financial inclusion.
Thinkstockphotos 178715713

Malware in your DNA sequence data? Technically, it's possible

Fri, 11th Aug 2017
#
malware
#
cybersecurity
#
hacking
Could hackers exploit your DNA sequence and encode it with malware? A new study from the University of Washington says yes, it's possible.
Thinkstockphotos 482203874

KONNI Remote Access Trojan linked to attacks on North Korean affairs

Thu, 10th Aug 2017
#
malware
#
ai security
#
ai
Cylance have linked the KONNI Remote Access Trojan (RAT) that is targeting North Korean affairs to the DarkHotel threat actors.
5d968221e73c4c71a9f43d8cc78e49e6

WatchGuard closes Datablink acquisition; continues push into authentication market

Wed, 9th Aug 2017
#
firewalls
#
network infrastructure
#
network security
WatchGuard Technologies is venturing into the advanced authentication market after officially closing its acquisition of Datablink.
Thinkstockphotos 612408736

Internet Solutions scoops two awards at Mimecast South Africa Partner Awards

Tue, 8th Aug 2017
#
phishing
#
email security
#
email
Internet Solutions, a Pan-African telecommunications provider, has won two awards at the 2017 Mimecast Partner Awards in Johannesburg.
Thinkstockphotos 531244436

Lumina Networks takes open source approach to SDN market

Tue, 8th Aug 2017
#
network infrastructure
#
sdn
#
open source
Lumina Networks enters SDN market with acquisition of SDN Controller assets, offering services and open source technology.
1

Chinese firm hacks way to success at Microsoft Hackathon

Mon, 7th Aug 2017
#
microsoft
#
hacking
#
ping an technology
China-based IT firm Ping An Technology was the only Chinese company to be invited to Microsoft's Hackathon in the US this year.
Thinkstockphotos 480137882

$534m lost in 2016 as credit card fraudsters ditched the plastic & moved online

Mon, 7th Aug 2017
#
semiconductors
#
credit card fraud
#
online shopping
Physical credit card fraud is on the decline as online fraud takes its place, according to new statistics from the Australian Payments Network.
Thinkstockphotos 808760574

Why you should let employees step forward in fight against cybercrime

Mon, 7th Aug 2017
#
firewalls
#
ddos
#
network infrastructure
It's now all about technology: Move away from the notion that having a single security device at the edge will make you secure.
Fallback

Who's that in your network? Security strategies to take control of every user group

Mon, 7th Aug 2017
#
wireless networks
#
cloud services
#
sonicwall
The retail sector is one of the most lucrative sectors for cyber attackers. SonicWall can help you navigate the challenges & build a security system.