All Security Threats articles – Page 15
-
Video
Data Protection and Cyber Security Implications from Working from Home
Video: Data Protection and Cyber Security Implications from Working from Home
-
ebook
Does Office 365 deliver the email security and resilience enterprises need?
With 60% of corporate knowledge workers reporting that email remains their most commonly used mode of communication, email continues to be the backbone of enterprise communications and could be considered the most critical infrastructure for daily operations.
-
ebook
Improving Cybersecurity for Remote Working: 13 Recommendations
What are the security implications of this abrupt change? And which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?
-
ebook
Remote Work Security: Privacy and Cybersecurity Essentials
With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.
-
Article
Ransomware families launch sites to publish stolen data
Numerous ransomware families are adopting the new tactic of leaking stolen data of non-paying victims.
-
Feature
Coronavirus quarantine and cybercrime
The increase and global spread of cybercrime is partly linked to the amount of people being online, the increase of devices being used by each one of us and to the amount of time we spend online.
-
News
Lead generation company exposes over 110m records
Lead generation company, Leadhunter, has exposed and lost over 110 million records due to an unsecured database.
-
Feature
Battling the rise of the deepfakes
Deepfake videos are becoming commonplace. So much so that you may have come across one without realising. Today, over 15,000 deepfakes are reportedly lurking online.
-
Article
Ireland ranked least vulnerable European country to cybercrime
Research reveals that the Netherlands is the most vulnerable European country to cybercrime.
-
Feature
Why employees are a threat to cyber security
The most common cyber attacks reported by UK companies in 2018 were all incidents that take advantage of employees and pose significant risks to businesses.
-
Feature
Can artificial intelligence beat a human hacker?
At some point, we have all completed a captcha to prove we are human when online. So, when a robot successfully completed the test, we were left asking, are our computers secure?
-
News
Research reveals the most vulnerable IoT devices
SAM Seamless Network unveils its Threat Assessment Lab research, investigating new attack vectors focusing on IoTs.
-
Article
‘Ethical’ hack compromises data of countless online shoppers
Hundreds of thousands of online shoppers have had their personal data exposed in a recent ‘ethical’ hack.
-
News
Tesco hit with £16.4m fine following cyber fraud
The Financial Conduct Authority (FCA) has hit Tesco Bank with a fine of £16.4m fine following the popular bank’s failure to deal with a cyber-attack that occurred in November 2016.
-
Feature
10 ways cybersecurity will evolve in the next five years
Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.