Tag "Cyber Criminals"

Back to homepage
Software

Cyberwar against NATO: Who are Earworm and APT28?

There is a group of cybercriminals who are really making things difficult for NATO. The group is called Earworm and, over the last few years, it has been doing what

Industry Insights

Part One: Understanding cyber security in accountancy

Emmy Hawker takes a deep dive into cyberspace, assessing how prepared accountancy firms and practices are for the ever-growing threat of cyber-crime. In June 2018, the UK’s technology sector was

Software

Identity-Defined Security is Critical in a Digital Transformation World

In an economy driven by information, data has always been every organization’s most important asset, and cyber-criminals know this, which is why they almost always start an attack by compromising

Software

How ransomware continues to target businesses and what to do about it

Criminals use ransomware because it allows them to make an easy profit. It takes time to make money from data dump attacks: criminals have to find a buyer for the

Identity Theft

Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

The first quarter of every year produces dozens of reports that both reflect on the threats of the previous year and look ahead to understand how to avoid future security

Hardware/Network

Average DDoS attack sizes decrease 85% due to FBI’s shutdown of DDoS-for-hire websites

The FBI’s shutdown of the 15 largest distributed denial-of-service (DDoS) for hire vendors (booters) reduced the overall number of attacks worldwide by nearly 11 percent compared to the same period

Industry Insights

Cyber war is here, according to 87% of security professionals

A study from Venafi has concluded that the world is in the midst of a cyber war, with 72% of respondents believing nation-states have right to ‘hack back’ cybercriminals. The

Industry Insights

Human behavior can be your biggest cybersecurity risk

Changes in user behavior are increasingly blurring the lines between personal and business. Trends like Bring Your Own Device (BYOD) and flexible working often mean that people are using work

Software

Enterprises are blind to over half of malware sent to their employees

As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible because SSL

Hardware/Network

IoT, APIs, and Criminal Bots Pose Evolving Dangers

A pair of reports reach similar conclusions about some of the threats growing in cyberspace and the industries likely to be most affected.A pair of research reports released today paint