Telecommunications companies in Pakistan and Afghanistan and a port in Malaysia targeted
Android Spyware ‘Revive’ Upgraded to Banking Trojan
Dubbed ‘Revive’ because of its ability to automatically restart in case it stops working, the tool seems to be designed for persistent campaigns.
Clear Rules Needed to Prevent Conflict and Struggle in Cyber Space, Says NCSC Chief
NCSC chief executive Lindy Cameron explains that clear rules are needed to govern the use of cyber capabilities
Akamai?s Observations of Confluence Zero Day (CVE-2022-26134)
The Atlassian Confluence vulnerability is here to stay. See Akamai’s research into the stats two weeks after the advisory was released.
97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors
The EY Quantum Readiness Survey 2022 contains the responses of 501 executive-level business leaders
Stress and Burnout Could Lead to Exodus of CNI Cybersecurity Leaders
95% of cybersecurity leaders are experiencing factors that would make them likely to leave their role in the next 12 months
How a town on Spain’s Costa Blanca became a Nazi retreat
Traditional wisdom tells us that many Nazis escaped to South America, but hundreds more also made Spain home following WWII with the help of fascist dictator Franco. The Valencian town of Dénia in particular hides a very dark past.
I, A Brit, Went To Tokyo, And Here Are 18 Things I Noticed That Are Pretty Effing Different From The UK
Yes, that is a rabbit on a lead.View Entire Post ›
The business context for information risk and security
Although the
organisational/business context is clearly relevant and important to information risk and
security management, it is tricky to describe. In my opinion, clause 4 of ISO/IEC 27001 is so succinct that it leaves readers perplexed as to …
Unknown Hacker Steals $100m From California-Based Cryptocurrency Firm Harmony
Harmony reassured customers the rest of funds held on its blockchain were safe