All Security articles – Page 28
-
Article
Hackers can bypass Visa card’s contactless limit
Security researchers at Positive Technologies have discovered flaws that could bypass the payment limits on Visa contactless cards.
-
Feature
Why employees are a threat to cyber security
The most common cyber attacks reported by UK companies in 2018 were all incidents that take advantage of employees and pose significant risks to businesses.
-
Feature
Interview: Behind The Great Hack, with David Carroll
Released this summer on Netflix, The Great Hack is a documentary that explores the murky data-sharing relationship between Facebook and Cambridge Analytica.
-
Feature
Can artificial intelligence beat a human hacker?
At some point, we have all completed a captcha to prove we are human when online. So, when a robot successfully completed the test, we were left asking, are our computers secure?
-
News
Research reveals the most vulnerable IoT devices
SAM Seamless Network unveils its Threat Assessment Lab research, investigating new attack vectors focusing on IoTs.
-
News
What is GDPR’s impact on cyber insurance?
Experts say that the EU’s General Data Protection Regulation (GDPR) is pushing up the demand for cyber insurance – a trend that may increase as GDPR-style rules are adopted around the world.
-
News
McAfee, Symantec & Trend Micro breached by Russian hacking group
The three US-based antivirus software vendors that had been breached by a Russian hacking group have now been identified.
-
Article
Inadequate security sees surge in IoT data breaches, study shows
Research finds that the number of data breaches linked to Internet of Things (IoT) devices has increased considerably over the last two years.
-
Article
‘Ethical’ hack compromises data of countless online shoppers
Hundreds of thousands of online shoppers have had their personal data exposed in a recent ‘ethical’ hack.
-
News
Tesco hit with £16.4m fine following cyber fraud
The Financial Conduct Authority (FCA) has hit Tesco Bank with a fine of £16.4m fine following the popular bank’s failure to deal with a cyber-attack that occurred in November 2016.
-
Feature
10 ways cybersecurity will evolve in the next five years
Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.
-
Feature
PSD2: Are you ready for strong customer authentication (SCA)?
Let’s start with the basics, The Second Payment Services Directive (PSD2) was officially published by the European Commission in December 2015 and follows on from the First Payment Services Directive (PSD1), which was implemented in 2009.
-
Feature
Data masking: Anonymisation or pseudonymisation?
Among the arsenal of IT security techniques available, pseudonymisation or anonymisation is highly recommended by the GDPR regulation. Such techniques reduce risk and assist “data processors” in fulfilling their data compliance regulations.
-
Feature
Why communication is vital during a cyber-attack
Cyber-attacks are a constant threat to organisations. Cloud-based communications platforms can help an organisation improve emergency communications and recover from the effects of a cyber-attack.