YOU ARE AT:TagsCyber attacks

BROWSING: cyber attacks

Telefonica Tech launches cyber intelligence offering for large firms

Telefonica Tech noted its new cyber-intelligence service is part of the NextDefense managed services Telefónica Tech, which is a unit of Spanish carrier Telefonica, has launched a comprehensive cyber intelligence service for large enterprises, the company said in a release. Telefónica Tech’s new service provides guidance...

Attacks on web applications rise as data moves to the cloud, Verizon finds

Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report. Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...

Chinese hackers target global telecom companies to track customers

More than a dozen global mobile network providers have been attacked in a successful effort to obtain information on specific subscribers, including call detail records and geolocation information, according to a cybersecurity firm and published reports. Security firm Cybereason, which detailed the mechanisms behind...

Kudelski, Pepper IoT ink deal to protect US retailers

  The two companies said they will work together to influence best practices for retailers to minimize risk of cybersecurity threats   U.S. provider internet of things provider Pepper IoT has inked a long-term deal with Swiss digital security firm Kudelski Group to protect IoT service providers...

Nokia unveils eSBC to mitigate cyber attacks

Nokia announces Enterprise Session Border Controller Nokia introduced a new cloud-native Enterprise Session Border Controller (eSBC), which the company said provides high-quality IP voice and video services. Nokia's eSBC is intended to mitigate cyber attacks, optimize the use of IP bandwidth for communications and thwart unauthorized...

How to patch security holes

What are security holes? Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...

How to protect NFV and SDN from cyber attacks

The challenge of NFV and SDN security vulnerabilities Telecommunication operators are gung-ho about network functions virtualization (NFV) and software-defined networking (SDN). The former involves decoupling software from hardware, whereas the latter involves a central control plane that manages network behavior. Although both technologies provide several...

How to secure smart cities from cyber vulnerabilities

Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...