BROWSING: cyber attacks
Telefonica Tech launches cyber intelligence offering for large firms
Telefonica Tech noted its new cyber-intelligence service is part of the NextDefense managed services
Telefónica Tech, which is a unit of Spanish carrier Telefonica, has launched a comprehensive cyber intelligence service for large enterprises, the company said in a release.
Telefónica Tech’s new service provides guidance...
Attacks on web applications rise as data moves to the cloud, Verizon finds
Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report.
Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...
Chinese hackers target global telecom companies to track customers
More than a dozen global mobile network providers have been attacked in a successful effort to obtain information on specific subscribers, including call detail records and geolocation information, according to a cybersecurity firm and published reports. Security firm Cybereason, which detailed the mechanisms behind...
Kudelski, Pepper IoT ink deal to protect US retailers
The two companies said they will work together to influence best practices for retailers to minimize risk of cybersecurity threats
U.S. provider internet of things provider Pepper IoT has inked a long-term deal with Swiss digital security firm Kudelski Group to protect IoT service providers...
Nokia unveils eSBC to mitigate cyber attacks
Nokia announces Enterprise Session Border Controller
Nokia introduced a new cloud-native Enterprise Session Border Controller (eSBC), which the company said provides high-quality IP voice and video services.
Nokia's eSBC is intended to mitigate cyber attacks, optimize the use of IP bandwidth for communications and thwart unauthorized...
How to patch security holes
What are security holes?
Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...
How to protect NFV and SDN from cyber attacks
The challenge of NFV and SDN security vulnerabilities
Telecommunication operators are gung-ho about network functions virtualization (NFV) and software-defined networking (SDN). The former involves decoupling software from hardware, whereas the latter involves a central control plane that manages network behavior. Although both technologies provide several...
How to secure smart cities from cyber vulnerabilities
Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...