As the Bitcoin Value Rises to Over $1300, will this pay more to ransomware wielding cybercrminals?
Nomx Researchers Defend Work, Dispute Unfair Test Claims
Helme and Woodward defend research on nomx, as Donaldson claims testing was unfair and on old technology
Nearly Three-Quarters of UK Unis Are Phishing Victims
Duo Security stats reveal dangers of unsolicited emails
Winners Crowned in DCMS Cyber Security Innovation Competition
On Thursday March 27, 20 small cybersecurity companies went head-to-head in the Cyber Security Innovation Competition, each pitching themselves for the opportunity to win one of 14 places to feature in the DCMS UK Cyber Innovation Zone at Infosecurity …
How to reduce the consequences of Data Breach
The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, finan…
Shadow Brokers Attack Tools Light Up Chinese and Russian Darknet
Hackers keen to exploit this treasure trove of data
NoTrove Threat Actor Emerges with Millions of Scam Ads
Ad scams can be used to download potentially unwanted programs and can redirect users to unwanted places.
Hyundai Mobile App Flaw Allows Bad Guys to Unlock and Start the Car
Bad actors can also access personal information, including the user’s username, password, PIN and historical GPS data about the vehicle’s location.
Orgs Leave Thousands of Sensitive Files Open to Employees
47% of organizations were found to have at least 1,000 sensitive files accessible to every employee.