Tag "Cyber Crime"

Back to homepage
Software

You Think Your Business Is Primed To Deal With Any Cyber Threat – But What If It’s An Inside Job?

Seven top tips on how to prevent and cope with an insider threat. By Tom Huckle, Lead Cyber Security Consultant, Crucial Academy. An inside job brings up images of bank

Software

November 2018: Most wanted malware exposed

Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers saw it

Software

6.8% of the top 100,000 websites still accept old, insecure SSL versions

Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet security report. The Mac scareware appeared in

Industry Insights

Red-hot cyber: 5 cyber security startups next in line for the Unicorn Crown

Following the warning from MPs that the UK is ‘wholly’ unprepared to stop a devastating cyber attack, Information Age looks at the top cyber security start-ups. With big-tech companies looking

Industry Insights

ATM attackers strike again: Are you at risk?

The United States National ATM Council recently released information about a series of ATM attacks using rogue network devices. The criminals opened the upper half of the ATM and installed the device,

Software

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major recent cyber attacks and

Identity Theft Software

Infamous Russian Hacking Group Used New Trojan in Recent Attacks

A well known Russian state-sponsored cyber-espionage group has used a new Trojan as a secondary payload in recent attacks targeting government entities around the globe, Palo Alto Networks reports.  Also

Software Software Security

Conficker: A 10-year Retrospective On A Legendary Worm

This November marked the 10-year anniversary of Conficker, a fast-spreading worm targeting Microsoft systems that went on to claim one of the highest levels of infection in history. Millions of

Identity Theft

Third Parties: Fast-Growing Risk To An Organization’s Sensitive Data

The Ponemon Institute surveyed more than 1,000 CISOs and other security and risk professionals across the US and UK to understand the challenges companies face in protecting sensitive and confidential

Identity Theft

Black Friday Security Alert As Hackers Spoof Popular Brands

Shoppers need to be extra careful during the holiday season, report warns. Hackers are taking full advantage of the upcoming holiday season to prey on people looking to buy gifts