Friday , 20 July 2018
Home » Tag Archives: Technology (page 5)

Tag Archives: Technology

Bitcoin scammers posing as Elon Musk exploit Thai Cave rescue efforts

Crypto scammers looking to profit off of the rescue of 12 young soccer players and their coach from a Thai cave posed as Elon Musk in order to steal Bitcoin from unsuspecting users. View Full Story ORIGINAL SOURCE: SC Magazine Read More »

Ticketmaster Breach Part of Global Digital Skimming Campaign

The Ticketmaster UK ‘breach’ is far more extensive than at first thought — part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Read More »

Emma’s Diary faces fine for selling new mums’ data to Labour

A company that offers pregnant women and new parents health advice and gifts, faces a fine for illegally sharing more than a million people’s personal data with the Labour Party. View Full Story ORIGINAL SOURCE: BBC Read More »

Three Arrests Made in Largest Hack in Lebanon’s History

Beirut officials have arrested three suspects believed to be behind what local authorities are calling the biggest hack in Lebanon’s history. The arrests took place last week and included what police believe to be the main hacker, one of his accomplices, and a local businessman, according to Lebanese daily newspaper Al Akhbar. View Full Story ORIGINAL SOURCE: Bleeping Computer Read More »

Privileged access management is the next great step for businesses to take in cybersecurity, says EACS

Insider threats represent a significant danger to organisations trying to guard sensitive data from breaches, especially as businesses are tasked with protecting ever-growing amounts of data in the GDPR era. To tackle this, managed services provider EACS believes that privileged access management (PAM) needs to become a fixture of any cybersecurity strategy, and has demonstrated this commitment by entering into a collaborative ... Read More »

Stronger and more frequent brute force attacks are now the norm

The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix. Its analysis of data from more than 500 websites globally show that, apart from a dip in February, large-scale attacks have followed ... Read More »

RiskIQ maps the anatomy of a corporate attack surface

RiskIQ, the global leader in digital threat management, today released a report mining the company’s massive repository of internet data. The report maps the global internet attack surface over a two-week period, and in the process, reveals the true extent of the modern corporate attack surface. The report, ‘The anatomy of an attack surface: Five ways hackers are cashing in’ ... Read More »

Business Use Of Voice Technology To Triple In Next 12 months According To Pindrop’s Latest Survey

85 percent of businesses we surveyed will use voice technology – such as Amazon’s Alexa or Microsoft’s Cortana voice-activated assistants – to communicate with customers within the next year according to research from Pindrop, the pioneer in voice security and authentication. Currently only 28 percent of businesses do so, reflecting great ambitions within industry to create a “Conversational Economy” – ... Read More »

BTC to ‘rise’ as 90% of other cryptocurrencies ‘fail or DIE’

BITCOIN couldn’t maintain yesterday’s momentum overnight, but wallet holders will be encouraged by BTC hitting a high of $6,710, and broadly heading north, not south. Bitcoin has now been forecast by a panel of experts to rise 18 percent by August 1st. View Full Story ORIGINAL SOURCE: The Express Read More »

USB Fans Handed Out at Trump-Kim Summit Deemed Harmless

Two separate sources have confirmed that the USB-powered fans handed out at the North Korea–United States political summit that took place on June 12 were most likely clean and not infected with malware. View Full Story ORIGINAL SOURCE: Bleeping Computer Read More »