Tag: Cyber Security

Fake Fortnite for Android links found on YouTube

The extremely popular video game Fortnite is coming to Android sometime this summer, and the fanbase is going wild. Not surprisingly, mobile malware developers are taking advantage.

Bible Society fined £100k for cyber hack of 417,000 Christian backers

The password was the same as the username on the account, set up in 2009 but not hacked until November 2016!

Crypto Me0wing Attacks: Kitty Cashes in on Monero

The internet has been the gateway to fame for many a cat, but the latest vulnerability, the "Kitty" malware, has gained popularity for more nefarious reasons.

NATO triumphs in cyber defense exercise

International alliance proves its mettle in defending complex networks.

Irony of leaky app at RSA Conference not lost on attendees

Every once in a while, 280 characters can make people scratch their heads. Learning about a security flaw in a mobile app designed for a security conference is one of those things that people find puzzling. Or not.

Cybersecurity Awareness Must Generate From The Top

A culture is created where security isn’t just a cost center or a required set of checkboxes, but rather a game plan to better enable the business.

6 ways to make Smart Cities Cybersecurity-proof

How smart cities must adjust and adapt to the requirements of the new cybersecurity landscape.

Beware of Valentine’s Day online scams

While the internet houses a large number of dating sites that serve their purpose, many abound with romance scams - especially near Valentine's Day!

Crypto-Mining malware found on 4000+ sites

ICO, NHS, US Courts and many other government sites hit.

The labs that protect against cyber warfare

The world has entered a new era of conflict – offensive cyber-attacks aimed at infrastructure and society, all done without a shot being fired.

List of data breaches and cyber attacks in December 2017 – 33.8 million records leaked

Data protection is more than just protecting data from the unauthorised: it’s about ensuring it’s used for the sole purpose it was collected, and respecting the privacy of those whose data it is.

10 key Information Security mistakes organizations make! How to fix them?

See the 10 worst mistakes which are common to find, and important to address in the path of mature information security posture.