Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.
In this feature, we take a look at some of the key things you should be aware of to ensure that you are well-equipped to deal with insider threats.
Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.
In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.
How secure is the healthcare ecosystem? Following a recent spate of breaches in the sector, we set out to determine the state of its cybersecurity.
California hospital pays the largest sum per plaintiff in history for its inability to secure the patients’ medical data.
Welcome to this week’s security review, which includes an in-depth look at how the ransomware dubbed Locky is infiltrating computer systems.
There has been a marked increase in ransomware attacks recently. We take a look at what this means and why backing up your data helps you combat this threat.
Highlights from the past seven days in information security include the threat from Locky, the nuisance of Robocalls and another celeb-related iCloud breach.
Highlights from the past seven days in information security include an Android banking trojan that not only has the ability to pose as Flash Player, but can also bypass 2FA security as well.
In 1942 six mathematicians were selected to program a machine that would help the US army calculate complex wartime ballistics tables. They helped to create ENIAC – one of the world’s first ever electronic computers. They were also all women.
Parisa Tabriz may not be a household name, but it’s only a matter of time. We take a look at Google’s Security Princess, who is changing the face of tech.
Welcome to this week’s security review, in which we’ll be assessing the buzzword-laden security startups of RSA, and rounding up the week’s biggest stories.
Keeping your family safe online is not about making a one-off investment in a security solution. It requires a proactive approach, once every two to three months for example, where you tick off a checklist. Here are five things to keep on top of.
Highlights from the past seven days in information security include porn clicker trojans at Google Play, digital childhoods and the security/privacy debate.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site