Tag "Hacking"

Back to homepage
Expert Articles

Animation for The Cybersecurity Place: Car hacking methods + prevention tips

Whether or not we realize it, cybersecurity is costing us. On average, malware attacks cost companies $2.4 million and 50 days worth of time — although the amount can be

Hardware/Network

How to Keep Your Client Data Secure (and Why It Matters)

Data security is a critical, yet overlooked issue for creative agencies. Our latest article will show you why data security matters more than ever and how to get better at

Software

Ransomware and malware attacks decline, attackers adopting covert tactics

There has been a major decline in ransomware and malware attacks, with Ireland having some of the lowest rates globally, according to the latest report released by Microsoft. This is

Mobile Software

WhatsApp Vulnerability Spies on Users

On Monday, May 13, 2019, the popular messaging app, WhatsApp, announced hackers had exploited a flaw in the app’s voice call feature, installing surveillance software on users’ smartphones (both iOS

Identity Theft

Before Blaming Hackers, Check Your Configurations

Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Click

Industry Insights

Top Tips On Cyber Security for SMEs

Cyber criminals are a part of modern life, from Uber account hacks to major business data breaches, our online identities are rarely safe. And, while big-name companies under threat often

Hardware/Network

Hacking our way into cybersecurity for medical devices

Hospitals are filled with machines connected to the internet. With a combination of both wired and wireless connectivity, knowing and managing which devices are connected has become more complicated and,

Software

Hacking healthcare: A call for infosec researchers to probe biomedical devices

It is a brave new connected world out there and there is no shortage of cybersecurity risks associated with everything we do. We can’t even be sure that the technologies

Expert Articles

Database Hacking & Its Prevention

By Arpit Jain, Cyber Security Engineer at NetWeb Software, SQL Stands for Structured Query Language. It’s a standard language to access, read & write databases. It is a simple language

Identity Theft

Firms pay more to bosses following a security breach and invest less in R&D, new study finds

Bosses get paid more after cyber security breaches to maintain their firms’ reputation, research and development spending gets cut, a study finds. Security breaches in firms have been on the