Eskenzi PR ad banner Eskenzi PR ad banner

Uncategorized

7 key advantages of using a VPN when working from home

VPN software has been prevalent in the digital market for decades now, however for most SMEs, the use of a virtual private network gained immense popularity more recently. Based on a recent report, hackers are using the coronavirus pandemic to spread malware on a colossal scale. Since the COVID-19 pandemic, people are now often working from home, and it has become the new norm for many organisations. This has highlighted the advantages of using a...

Read more
Tony Morbin IT Security Guru Editor

Today Tony Morbin joined IT Security Guru as editor in chief, signalling a drive to further develop this vital news and information source for the cyber security industry. Last week Tony left SC Media UK, the world’s longest established cyber security title, where he oversaw the transition from print to digital, as well as more recently engaging in the move from live to digital events during the coronavirus pandemic. Tony has also been publisher at Ten...

Read more
Homes in Malvern targeted by phishing phone scam

New research has revealed mobile phishing has increased by 37% in Q1 2020 compared to Q4 2019 with much of this rise a result of cybercriminals targeting the millions of those working from home due to the coronavirus pandemic that has plagued the world. The Mobile Phishing Spotlight Report also detailed the costly nature of mobile phishing attacks as an organisation with 10,000 mobile devices could suffer up to $35m for a single mobile phishing...

Read more
ISACA London Chapter Launches Membership Assistance Programme

Saying that we live in unprecedented times might be an understatement if there ever was one. People across the globe – those lucky enough to still have their job that is – have been forced to learn how to work from home, with the noise of children demanding attention, pets barking in the background and no chance to go out for a Friday night pint to wind down. But, if there is an industry that...

Read more
code

More than two dozen SQL databases stolen from online shops in various countries are being offered for sale on a public website. In total, the seller provides over 1.5 million rows of records but the amount of stolen data is much larger. The attacker is hacking into insecure servers that are reachable over the public web, copies the databases, and leaves a note asking for a ransom in return of the stolen data. Victims have...

Read more
EasyJet Wing

By now I’m sure that you have heard about the easyJet data breach. More than 9 million customers suffered breached personally identifiable information (PII), and some 2,000 customers had their card details “viewed”. Hugo van den Toorn, manager of offensive security at Outpost 24 warned that "often after such a breach, information will be sold on to underground marketplaces, this kind of data is then often used in various attacks: Credit card details for making...

Read more
Verizon Logo

Verizon published today its yearly Data Breach Investigation Report, based on real-world data from 41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and private entities, spanning 86 countries worldwide. The report provides a most useful snapshot of the current state of the fight against cybercrime, and highlights not only the weaknesses in organisations' approach to security, but also the areas where cybercriminals seem to be focussing their efforts. IT...

Read more
Home

By Kevin Bailey, Managing Director & Principal - Security Research at Omnisperience  When I look back at the cybersecurity industry, in the early 2000s it involved a few hundred vendors battling for their share of a ~$750 million market. The hacker was motivated by the chase and notoriety rather than monetary rewards. Fast forward to 2020 and sophisticated hackers have now established a matrix structure comparable to multinational corporations with the discipline, skills, diversity of...

Read more
Mobile Tracing NHS

Technology has undoubtedly made life more bearable during a global pandemic. From drones being rolled out to deliver medicines and essential items across Ireland, to the rise of video conferencing platforms, such as Zoom creating a more connected community of remote workers. The affordances of our ever increasingly digital epoch have made isolation more tolerable by providing interconnectivity and entertainment. However, there is a darker side to the rapid uptake of technology during this international...

Read more
Qualys

Last week, Qualys launched its latest solution, Vulnerability Management Detection and Response - VMDR, which integrates asset visibility, vulnerability management, detection and response across global hybrid-IT environments all from a single app. It was presented to the world with an informative webinar (available here). With the recognition that this launch is taking place during unprecedented times, we caught up with Sumedh Thakar, President and Chief Product Officer, and Philippe Courtot, Chairman and CEO at Qualys,...

Read more
Page 14 of 17 1 13 14 15 17