The Internet of Things (IoT) has been a boon for the cybercriminal industry. IoT devices number in the billions worldwide and most are unsecured or undersecured, making them appealing targets
“Freedom consists not in doing what we like, but in having the right to do what we ought.” – Pope John Paul II. Sometimes we need to look at the past
RiskIQ analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the cryptocurrency landscape is
There have been two notable evolutions made by hackers recently in the DDoS arena. First, there’s been an expansion of botnets. They’ve moved beyond PCs to compromised Internet of things
Most companies are using password “best practices” that are out of date and ineffective. Regulations are getting in the way of changing them. I rarely go to a conference where
Businesses have spent heavily on cyber security measures over the last year and anyone with even half an eye on the technology industry will by unsurprised by the reasons why.
Social engineering attacks are usually associated with deceptive phishing emails in which the victim is tempted to click on a malicious link or open a malicious attachment to help an
Enterprises face a dilemma when it comes to defence against today’s modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a