news

SEC Releases Guide To Combat Cybersecurity Threats


The Securities and Exchange Commission has released a guide to best practices to combat cybersecurity infractions, data loss and privacy breaches.

read more

FBI Fires Off A $3.5 Billion Cybercrime Warning


America's FBI has released the Internet Crime Complaint Center (IC3) "2019 Internet Crime Report." which shows that in on year the number of cybercrime complaints from individuals and business organizations reached a staggering 467,361. The total cost £2.7 billion.

read more

Fake Coronavirus Emails Contains Malware


Fear of the coronavirus infection is being leveraged by cybercriminals for their malicious activities, new research shows. Criminals disguised malware as documents proporting to be for educational purposes.

read more

Phishing Lures Still Affecting Organisations


A cybersecurity survey carried out by Proofpoint discovered that 90 percent of global organisations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users. Seventy-eight percent also reported that security awareness training activities resulted in measurable reductions in phishing susceptibility.

read more

Cyberattacks: Preparing For The Inevitable


It is generally accepted that it is when, not if, large organisations will be the target of malicious cyberattacks. The importance of being prepared has been laid out in a blog post Sweat In Peace, Don't Bleed In War, written by Meredydd Hughes, a former UK chief constable with substantial crisis management experience.

read more

Varonis Blog Highlights 110 Cybersecurity Statistics


Cybersecurity company Varonis has issued its predictions for the forthcoming year with a blog post entitled 110 Cybersecurity Statics For 2020. The blog states that cybersecurity issues are becoming a day-to-day struggle for businesses. Recent trends and cybersecurity statistics reveal a huge increase in hacked and breached data from sources that are increasingly common in the workplace, like mobile and IoT devices.

read more

UK To Go On The Cyber Offensive


The UK Government is about to launch a new proactive and offensive cybersecurity team that will wage cyberwarfare against hostile nation-states and online crime organisations. It would be naive to believe that the UK has not launched cyberattacks against third parties, but the killing of Qassem Soleimani has brought this out into the open.

read more

Are You Ready For Iranian Revenge Cyberattacks?


Following the killing of Qassem Suleimani no-one can be sure of what military action Iran will take, but experts agree that its cyberattacks will increase against countries and governments it sees as hostile.

read more

Ringing The Changes For IOT Security


Buying and installing a cyber-doorbell through which you can monitor callers even if you are away from home makes sense, yes? Not unless you are a user from Alabama who has launched a $5million legal against action after it is alleged that a hacker cracked the Ring doorbell and started harassing the family.

read more

Keeping Kids Safe Online This Christmas And Beyond


Odds on, this Christmas millions of children will be getting their first smartphone in their Christmas stocking. It will be a time of excitement for the kids, but a nervous one for parents who will have to set guidelines for use on social media and other interactive ways that their offspring can interact with friends.

read more

Kaspersky Outlines Information Security In Loss Figures


To budget for information security, companies need to consider factors such as average potential losses, preferably by incident type, as well as other businesses’ average outlays on security.

read more

The Worst 10 Cyberattacks Of The Decade


To most people who read the tech news and take an interest in all things cyber, hacking and cyberattacks are a daily occurence. As organisations attempt to build cyberwalls to protect their data, hackers and cybercriminals get more sophisticated in how they penetrate firealls and steal data.

read more