News and Media

HACKERS NEED INSIDERS, SO IT’S TIME TO PROTECT STAFF FROM THEMSELVES

With the hyper-cybersecurity regulations and the nearly $10 billion spent on cybersecurity during this decade, it wouldn’t be out of place to ask — how could a financial institution or payment card firm ever get hacked?
Read More

7 COMMON FLAWS THAT KEEP SECURITY MANAGERS UP AT NIGHT

Security managers are constantly asked what keeps them up at night. Unfortunately, given today’s threat landscape, it’s a very long list.
Read More

GDPR IS ALMOST HERE. BE FINED OR FLOURISH WITH CDR

Cyber risk has many faces, but the possibility of damaging an organization is a constant in all cyber-attack variations. If personal data is exposed, this not only puts the organization’s reputation at stake but also can generate harm to those individuals whose data was compromised. This is one of the...
Read More

VOTIRO HAS BEEN LISTED AS A FINALIST FOR THE 2018 INFOSEC AWARDS!

Winners of Coveted Information Security Awards to be announced during RSA Conference 2018 on April 16 in San Francisco, California
Read More

HACKERS NOW EXPLOITING WORD DOCUMENTS TO DISPLAY ‘INNOCENT’ VIDEOS THAT SECRETLY MINE CRYPTOCURRENCY

Hackers have been found exploiting Microsoft Word documents to deliver cryptojacking scripts to hijack victims’ computers and secretly mine cryptocurrency. Security researchers at Israel-based Votiro said the attack abuses Microsoft Word’s Online Video feature that allows users to insert remote videos directly into documents without having to embed them or...
Read More

BUSINESSES NEED TO TAKE A PROACTIVE APPROACH TO CYBER SECURITY, SAYS VOTIRO CEO

As business attitudes towards cyber security mature, the software itself is getting smarter. Which-50 spoke to Itay Glick, the CEO of cyber security company Votiro and a former member of Israel Cyber Intelligence Unit, about the increasing importance of cybersecurity, why Australian organisations “need to do better” and how they can tackle the problem.
Read More

RESEARCHER: MICROSOFT WORD FEATURE CAN BE EXPLOITED TO DISPLAY VIDEOS THAT MINE CRYPTOCURRENCY

Malicious actors can abuse Microsoft Word’s Online Video feature to deliver videos that secretly exhaust their viewers’ computer processing power in order to mine cryptocurrencies, according to Israeli cybersecurity firm Votiro.
Read More

HACKERS CAN NOW HIDE CRYPTOJACKING SCRIPTS IN MICROSOFT WORD DOCUMENTS

Microsoft Word documents can now be used by hackers to deliver a cryptojacking script—hijacking a victim’s computer to mine the cryptocurrency Monero. According to security researchers at Votiro, the attack utilizes Word’s Online Video feature to commandeer the CPU.
Read More

FILELESS MALWARE: NOT JUST A THREAT, BUT A SUPER-THREAT

It’s almost like something out of Star Trek. Imagine an alien who can see you, but whom you can’t see — one who has violence on his/her/its mind. A punch coming from out of nowhere; a vase flung at your head with no one seemingly throwing it; a punch to the...
Read More