Tag "Cyber Vulnerabilites"

Back to homepage
Vendor News

IBM X-Force: Hackers recycle previously stolen data to get into networks

Cybercriminals are not only sticking with traditional methods, such as phishing and exploitation of vulnerabilities, they are also recycling previously stolen credentials in hacking their way to an organization’s network,

Software

Ethical Hackers and Their Role in Cybersecurity

Over the past decade, as result of digital transformation, the cybersecurity landscape has rapidly evolved with new, more sophisticated cyber threats emerging all the time. Click here to view original

Software

The people factor: Understanding the psychology of cyberattacks

Exploring how cyberattacks can be targeted to exploit the psychology of your workforce. What makes for a successful cyberattack? Technology is one part of the picture, clearly. Click here to

Cloud

Three cybersecurity questions every organisation should ask their cloud service providers

For one month each year, companies and governments around the world participate in National Cybersecurity Awareness Month, raising awareness about the importance of IT security in our organisations and communities.

Software

Hackers are hijacking smart building access systems to launch DDoS attacks

Hackers are actively searching the internet and hijacking smart door/building access control systems, which they are using to launch DDoS attacks, according to firewall company SonicWall. Click here to view

Mobile

93% of attempted mobile transactions in 2019 were fraudulent

93 percent of total mobile transactions in 20 countries were blocked as fraudulent in 2019 according to a report on the state of malware and mobile ad fraud released by

Industry Insights

Cybersecurity: Ensuring Sanity in Smart Cities

Currently, we consider ourselves lucky if we don’t get stuck in traffic while driving to the office. The struggle of even finding a parking spot for your car is real.

Vendor News

Google Confirms It Paid Hackers $6.5 Million Last Year To Help Keep The Internet Safe

Paying hackers is no bad thing. Which is why PayPal recently paid $15,300 (£11,700) to one, Tesla is offering $500,000 (£380,000) to any that can hack a Tesla Model 3, and Apple is prepared to

Software

Cybersecurity pros offer their 2020 predictions for healthcare

Ransomware “will continue to be the biggest issue,” says one expert – but a troubling new trend of attacking automatic software and firmware update systems is another area for concern.

Industry Insights

Mandatory IoT Security in the Offing with U.K. Proposal

The new U.K. law mandates that manufacturers apply several security controls to their connected devices. The U.K. government has unveiled a proposed law aimed at securing internet of things (IoT)