Category: Spotlight on Security

Is the criminal law on terrorism financing too tough?

Is the criminal law on terrorism financing too tough?

The global community must maintain a tough legislative stance to contain the influence of terrorists who use their contributions to humanitarian activities to win over the hearts and minds of local communities. The Independent Reviewer of Terrorism Legislation in the UK, David Anderson QC, in his fourth report on terrorism financing legislation highlighted the negative […]

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking

In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you the control over the way an operating system or a piece of software behaves. Some of the software that utilizes hooks include: application security solutions, system utilities, tools for programming (e.g. interception, debugging, extending […]

(ISC)² Announces 2017 Asia-Pacific Information Security Leadership Achievements (ISLA) Honorees

(ISC)² Announces 2017 Asia-Pacific Information Security Leadership Achievements (ISLA) Honorees

ISLA Gala to be held concurrently with (ISC)2 Security Congress APAC July 3-4 in Hong Kong (ISC)² has announced the honorees for its 11th annual Asia-Pacific Information Security Leadership Achievements (ISLA) Program. (ISC)² will recognize 24 honorees and announce six showcased workforce initiatives, as well as a community service star at a gala dinner and ceremony […]

Gartner Forecasts Worldwide Cloud-Based Security Services to Grow 21 Percent in 2017

Gartner Forecasts Worldwide Cloud-Based Security Services to Grow 21 Percent in 2017

Cloud-Based Security Services Will Be Worth US$9 Billion in 2020 Growth in worldwide cloud-based security services will remain strong, reaching $5.9 billion in 2017, up 21 percent from 2016, according to Gartner, Inc. Overall growth in the cloud-based security services market is above that of the total information security market. Gartner estimates the cloud-based security […]

Taming information overload for effective border controls

Taming information overload for effective border controls

By Nate Carpenter from Securiport; Speaker at Interpol World 2017 In 2016, global outbound travel exceeded $2 trillion, for the first time ever.[1] Despite a marked increase in security threats, people all around the world still desired to travel and take vacations. However, the sheer volume of people crossing through borders daily has made it […]

SMART Facilities Management Solutions Conference and Exhibition 2017 integrate innovation and productivity in today's digital economy

SMART Facilities Management Solutions Conference and Exhibition 2017 integrate innovation and productivity in today’s digital economy

The 4th edition of SMART Facilities Management Solutions Exhibition and 3rd edition of Facilities Management Conference 2017 will be held on 20 and 21 July at Sands Convention & Exhibition Centre, Singapore. Known as the region’s leading platform that integrates the facilities management (FM) in the built environment sector the event will address the growing […]

New Trend Micro Report: The Fake News Machine

New Trend Micro Report: The Fake News Machine

Trend Micro has released a new report ‘The Fake News Machine: How Propagandists Abuse the Internet and Manipulate the Public’ Fake news was relatively unheard of last year (until the U.S. election campaign period started) during which an explosion of misinformation campaigns trended. But despite its seemingly rampant spread, fake news is just one facet of […]

Hexagon Safety & Infrastructure Launches Incident Command System Application

Hexagon Safety & Infrastructure Launches Incident Command System Application

Intergraph Planning & Response helps agencies manage major incidents and events Hexagon Safety & Infrastructure has launched Intergraph Planning & Response, an application for managing major incidents and events. The system integrates and coordinates resources, procedures and communications during large-scale emergencies, natural disasters, festivals, sporting events and more. It supports individual or multiple agencies and works across […]

Islamic State’s Chemical Weapons Capability Degraded, IHS Markit says

Islamic State’s Chemical Weapons Capability Degraded, IHS Markit says

But group likely retains expertise to produce small batches of sulphur mustard and chlorine agents There has been a major reduction in the use of chemical weapons (CW) by the Islamic State in Syria in 2017, and a concentration of CW attacks in Iraq inside the besieged city of Mosul, according to new analysis from […]

MacRansom comment from Mimecast

MacRansom comment from Mimecast

With MacRansom again hitting the headlines as the first ransomware-as-a-service found to target Mac OS has been uncovered – it is time for many Mac users to accept their computer is not as secure as they might believe. It is true that it’s less likely for a Mac OS user to be attacked or infected […]

  • Categories

  • RSS Travel Advice

  • RSS My Security TV