Tag "Hacking"

Back to homepage
Industry Insights

Cybersecurity Risk Posed to Incoming Students

A recent report by cybersecurity firm Proofpoint has revealed that the vast majority of the UK’s universities, including Oxford, have failed to take recommended precautionary steps to protect students from

Hardware/Network

6 Growth Hacking Tactics Every IT Security Company Must Exploit

There are plenty of lead generation strategies out there, but the most important part of all of this is creating a strategy that will take advantage of multiple channels of

Software

Hacked Hair Straightener Could Set a Fire

Security researchers have hacked hair straighteners from Glamoriser, according to Pen Test Partners. The UK firm bills itself as the maker of the “world’s first Bluetooth hair straighteners,” devices that users can link to

Industry Insights

Talent key to cyber-security, say experts

Threats to cybersecurity continue to grow, and the global society needs bold ideas and innovations to address these challenges. Cultivation of cybersecurity talent will depend on collaboration among industry, academia

Expert Articles

Animation for The Cybersecurity Place: Car hacking methods + prevention tips

Whether or not we realize it, cybersecurity is costing us. On average, malware attacks cost companies $2.4 million and 50 days worth of time — although the amount can be

Hardware/Network

How to Keep Your Client Data Secure (and Why It Matters)

Data security is a critical, yet overlooked issue for creative agencies. Our latest article will show you why data security matters more than ever and how to get better at

Software

Ransomware and malware attacks decline, attackers adopting covert tactics

There has been a major decline in ransomware and malware attacks, with Ireland having some of the lowest rates globally, according to the latest report released by Microsoft. This is

Mobile Software

WhatsApp Vulnerability Spies on Users

On Monday, May 13, 2019, the popular messaging app, WhatsApp, announced hackers had exploited a flaw in the app’s voice call feature, installing surveillance software on users’ smartphones (both iOS

Identity Theft

Before Blaming Hackers, Check Your Configurations

Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Click

Industry Insights

Top Tips On Cyber Security for SMEs

Cyber criminals are a part of modern life, from Uber account hacks to major business data breaches, our online identities are rarely safe. And, while big-name companies under threat often