Tag "Cyber Attacker"

Back to homepage
Software

How to Cyber Security: Software is critical infrastructure

The United States recognises 16 distinct sectors of critical infrastructure, which are systems that are considered crucial to national economic security and national public health. Other countries have similar lists. Many

Industry Insights

Adopting cyber mission assurance for cyber security

Matthew Mackay, Cyber Risk Analyst at Whiteflare Consulting, explains why organisations should follow a cyber mission assurance approach (CMA) for cyber security. Click here to view original webpage at www.bcs.org

Industry Insights

UK Retailer Sweaty Betty Hacked to Steal Customer Payment Info

The web site for UK activewear retailer Sweaty Betty has been hacked to insert malicious code that attempts to steal a customer’s payment information when making purchases. Click here to view

Artificial Intelligence

How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks

The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed –

Hardware/Network

Electron Framework Vulnerabilities – Shutting the Backdoor

The Electron framework plays an important role in many communication software – Skype, Slack, WhatsApp and GitHub to name just a few. As a cross-platform development tool it offers developers the flexibility

Software

Should You Build Your Infrastructure to be Hit by a Cyber Attack?

There’s a perfect cybersecurity storm happening. We’re seeing more attacks than ever before but there aren’t enough infosec experts out there to defend organizations, meaning that infrastructure and operations teams

Software

Indicators Of Behavior: The New Telemetry To Find Advanced Cyber Attackers

In the world of cybersecurity, the men and women who keep us safe rely on Indicators of Compromise (IOCs): hashes of malware files, URLs, domain names and other artifacts from

Industry Insights

Three cornerstones for effective cyber security

Maritime’s fragmented approach to digitalisation carries risk, especially when it comes to cyber security. Speaking recently at Lloyd’s Register Asia Shipowners’ Forum, Wallem Group chief executive Frank Coles highlighted how

Network Security

“Major Flaw” Discovered in Evernote’s Chrome Extension

A major flaw has been discovered in the code of the Web Clipper Chrome extension of note-taking service Evernote. The flaw, a universal XSS marked CVE-2019-12592 which could have allowed

Industry Insights

Cyber Attackers and IT Admins: Twins Separated at Birth

Conventional wisdom says IT administrators are diametrically different than cyber attackers. A stereotypical hacker is imagined as someone in a hoodie in a dark room using command line tools to