Latest Articles

Companies fear data breaches caused by compromised credentials

Companies fear data breaches caused by compromised credentials

Companies fear data breaches caused by compromised credentials

Two thirds of security professionals rate the risk of a future data breach, due to compromised credentials, as medium or high.

Editor27 Apr 2016


Ransomware and the Internet of Things

Ransomware and the Internet of Things

Ransomware and the Internet of Things

A report from the Institute for Critical Infrastructure Technology warns that ransomware could be hitting more than just your regular computer in future...

Graham Cluley27 Apr 2016


BeautifulPeople.com experiences data breach: 1m affected

BeautifulPeople.com experiences data breach: 1m affected

BeautifulPeople.com experiences data breach: 1m affected

The personal data of around 1.1 million people could be sold off on the black market after BeautifulPeople.com experiences data breach.

Narinder Purba26 Apr 2016


Insider threats: A persistent and widespread problem

Insider threats: A persistent and widespread problem

Insider threats: A persistent and widespread problem

In this feature, we take a look at some of the key things you should be aware of to ensure that you are well-equipped to deal with insider threats.

Editor26 Apr 2016


Data privacy and data protection: US law and legislation white paper

Data privacy and data protection: US law and legislation white paper

Data privacy and data protection: US law and legislation white paper

This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.

Stephen Cobb26 Apr 2016


The security review: Dorkbot, encryption and buildings

The security review: Dorkbot, encryption and buildings

The security review: Dorkbot, encryption and buildings

Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.

Editor25 Apr 2016


SMS phishing attackers continue to pursue Apple users

SMS phishing attackers continue to pursue Apple users

SMS phishing attackers continue to pursue Apple users

You would be wrong to think that this is just an attempt by the criminals to steal your Apple ID password - bad as that would be. It's much worse than that.

Graham Cluley23 Apr 2016


Two-factor authentication coming to PlayStation Network

Two-factor authentication coming to PlayStation Network

Two-factor authentication coming to PlayStation Network

Two-factor authentication (2FA) is to be added to the PlayStation Network, offering members even greater security.

Narinder Purba22 Apr 2016


Australian government spends $230m on new cybercrime strategy

Australian government spends $230m on new cybercrime strategy

Australian government spends $230m on new cybercrime strategy

The Australian government has set aside $230 million in a new cybercrime strategy with a five-pronged plan of action.

Narinder Purba21 Apr 2016


Encrypt – or face a huge fine

Encrypt – or face a huge fine

Encrypt – or face a huge fine

The ICO, the UK’s independent authority that oversees data privacy, recently released a new guidance on encryption best practices. The key message - encrypt or face a big fine.

Peter Stancik21 Apr 2016


Dorkbot: 5 years since detection

Dorkbot: 5 years since detection

Dorkbot: 5 years since detection

In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been affected in over 190 countries. It has, quite literally, wormed its malicious way into computer systems throughout the world.

Editor20 Apr 2016


Buildings at risk of cyberattacks

Buildings at risk of cyberattacks

Buildings at risk of cyberattacks

Buildings are increasingly susceptible to cyberattacks, with the Internet of Things presenting cybercriminals with new opportunities to exploit.

Narinder Purba20 Apr 2016


Apt Activity Report
MDR Protection