Concerns raised over South Africa’s proposal to tie people’s biometric data to their SIM cards
HHS Information Security Program ‘Not Effective’
Office of Inspector General slams department’s security program four years running
UK to Place Security Requirements on App Developers and Store Operators
Under the proposals, all app stores would be required to commit to a new code of practice
UK to Place Security Requirements on App Developers and Store Operators
Under the proposals, all app stores would be required to commit to a new code of practice
An Attack Surface Workout for Web Application and API Attacks
WAF Attacks have been increasing dramatically over the last 9 months. These attacks cut across industries, geos and customers. Growth has largely been driven by Local File Inclusion (lfi) attacks, which took the lead from SQL Injection attacks in early…
Healthcare and Education Sectors Most Susceptible to Cyber Incidents
ICO’s data revealed a signficant growth in ransomware attacks last year
NCSC Updates Code of Practice for Smart Building Security
New document has been rewritten for the connected era
State-Backed Chinese Hackers Target Russia
Google claims state actors are using Ukraine war as a phishing lure
What happens to your MIT digital presence after graduation
If you are graduating from MIT this month, congratulations! This also means it’s time to start preparing for life after commencement. “Offboarding” is the process of transitioning and closing out your digital presence at MIT. It is important that you d…