Muhammadu Buhari: A Nepotist and Mujahid in Govern... » SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW Acts of a President with a mustard seed-mind and a ... UK lockmakers meet the lock attack challenge » UK police are continuing to warn householders about the vulnerability of domestic entrance door lock... Executive cyberstrategy sessions unite senior ex... » Medford, NJ: Watchful Software has announced the launch of its new Global Thought Leadership Program... Matrix42 launches new package manager for Microsof... » London: Matrix42 has announced the latest release of its new Package Manager solution. Administrator... Peplink helps innovative Sao Paolo School solve ... » Peplink has announced a successful project with Colégio Next, a school in Sao Paolo, Brazil that has... Certifigate Found In the Wild on Google Play » New insights on the extent, exploitation, and mitigation of this threat Three weeks ago, Check Poin... TACKLE WORLDWIDE WATER SHORTAGES WITH DIET, SAYS ... » At the start of World Water Week - the forum tackling global water challenges - The Vegan Society ha... 2015 Presidential Election Isuues » After that historical backgrounder in Part I, I shall now examine 4 election issues, the two on ever... Analysys Mason tackles file sharing securely wit... » London (UK): Varonis Systems, Inc. has confirmed how it has helped telecoms research and consultancy... ASIS and (ISC) 2® to host Career Center at ASIS... » Alexandria, Va.: Security professionals can get answers to their most pressing career questions and ...


ABCER Summit


Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.


Subscribe to Vigilance Weekly

Useful Links

SIA Logo

Who's Online

We have 85 guests online


Security watchers have warned about a new class of DDoS amplification attack threat which only exists because too many users are failing to follow basic safeguards:

Improperly configured services such as DNS or Network Time Protocol (NTP) have been exploited to launch a string of DDoS attacks over the last couple of years, the most high-profile of which battered Spamhaus and buffeted internet exchanges back in March 2013. Over recent weeks, another service – Portmap – has become a vector of DDos attacks, US-based carrier Level 3 warned.

Following the infamous Ashley Madison hack, in which hackers have released the personal data of thousands of people who used the adultery website..

Lamar Bailey, Director of Security Research and Development at Tripwire discusses the implications of the breach: “This has been one of the most interesting breaches this year. The data stolen and released has far reaching social implications and people are already harvesting and creating metrics on the data. Sites are publishing which cities have the most “cheaters” using which cities have the most profiles listed on the site. This could play into hiring decisions too because many companies run background checks, Facebook, Twitter, and Google searches for applicants. If an applicant shows up as an Ashley Madison user does that show something about the applicant’s trustworthiness and morals?


...Buharism and the Fierce Urgency of Now

"The nation's civil service is currently a mere Gossip Arena and retail outlets for merchandising. Workers stroll in to work at whatever time they like, waka about and leave after such gossips. No stationery, other writing materials and such things like computers similar Government Departments in the West take for granted are hardly available as workers have to quarrel over the use of the few that ministers, permanent secretaries and directors have grudgingly provided, whilst they pocket the money meant for providing office facilities and equipment."

With the quality and quantity of SaaS tools available within the IT world, it has never been easier to use the top of the line products available for organisations. As SaaS tools have become more professional and reliable, a risk that may not have been immediately apparently has arisen – Shadow IT.


Botswana, Ghana, Kenya, Gabon and Zambia’s Defence Forces to gather in Gaborone for African armoured vehicle community’s premier forum

African modernisation programmes and procurement initiatives are collectively valued at up to $20bn over the next decade for armoured and tactical vehicles. Armoured Vehicles Africa will offer an unrivalled opportunity to engage with the most important issues for the procurement, sustainment, training and operational use of armoured vehicles across Africa.

News has broken that Mumsnet has reset its users' passwords after a series of attacks, one of which involved armed police being called out to the London home of the parenting site's co-founder. Hacker gained access to the site’s administrative functions and hijacked some accounts. There have also been an attempt to force Mumsnet offline by swamping it with internet traffic, in a distributed denial of service (DDoS) attack.

The British Security Industry Association (BSIA) and its Information Destruction section are pleased to announce the publication of a white paper to be used by public sector entities.