• img September 11, 2017

Insurers increasingly concerned about silent cyber exposure

Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically designed to cover cyber risk – as growing over the coming year, according to Willis Re. Silent cyber exposure In the Willis Re survey, respondents were asked to assess the […]

Read More
  • img September 11, 2017

Global DDoS mitigation market trends and developments

Frost & Sullivan found that the DDoS mitigation market generated a revenue of $816 million in 2016 and is expected to register a CAGR of 17.1 percent through 2021. Threat actors’ continuous development of new techniques to overwhelm their target’s defenses and improve effectiveness of their DDoS attacks in terms of scale, frequency, stealth, and […]

Read More
  • img September 11, 2017

Week in review: Equifax breach, Instagram hack, Android Toast Overlay attack

Here’s an overview of some of last week’s most interesting news and articles: Patch your Android device to foil Toast Overlay attacks Overlay attacks are nothing new for Android users, and Palo Alto Networks Unit 42 researchers have found yet another way for attackers to perpetrate them. Review: Cato Cloud Cato Cloud is a custom-built, […]

Read More
  • img September 09, 2017

Android Users Vulnerable to ‘High-Severity’ Overlay Attacks

Android phones not running the latest Oreo OS are vulnerable to a high-severity “toast” overlay attack.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/android-users-vulnerable-to-high-severity-overlay-attacks/

Read More
  • img September 08, 2017

Patch your Android device to foil Toast Overlay attacks

Overlay attacks are nothing new for Android users, and Palo Alto Networks Unit 42 researchers have found yet another way for attackers to perpetrate them. An “overlay attack” allows an attacker’s app to lay windows over other windows and apps running on the device, effectively tricking users into clicking on buttons and allowing actions that […]

Read More