Have you been involved in a data breach? Find out if your data’s been breached and what to do if it is. This guide will help you find out where and when, and lists the steps you should take next. Data breaches are security incidents we now hear about in every day cybersecurity news. They […]
Technology News: In a new report, McKinsey identifies innovative ways industries can benefit from applying AI. Artificial intelligence (AI) is transforming how businesses across many different industries operate. By adopting AI, businesses can automate activities, producing more efficient and effective results. The McKinsey Technology Trends Outlook 2022 report took an in-depth look at AI and its many […]
While the internet has undoubtedly brought new benefits, it’s also brought new problems, as cyber criminals look to exploit our ever-growing reliance on connectivity. The internet has provided malicious hackers with a variety of new ways to make money and cause disruption. Cyber criminals use phishing emails, malware, ransomware, and other malicious tactics to steal bank details, passwords […]
The security breach that hit Uber last week was the work of Lapsus$.Uber said it is in close coordination with the FBI and US Justice Department on the matter. Lapsus$ is a South American hacking group has attacked a number of technology giants in the past year, including Microsoft, Samsung, and Okta. What Happened? An Uber EXT contractor had […]
Microsoft rolls out a new security feature that should significantly slow down password attacks against Windows devices.The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default. This makes Windows 11″a very unattractive target” for hackers trying to steal credentials, since it’s much more time-consuming for them to target […]
One of the key components of global trade is also one of the most vulnerable to cyber security threats, which is why cyber security awareness is so important. Global supply chains rely on the smooth running of shipping and ports, but maritime cybersecurity is too often a low priority. Since the whole industry is reliant […]
Gmail is used by millions of people around the globe. As of July, 28.13% of people use Gmail as their primary email client. Regularly, users have to send sensitive information to others. A few years back Google added a nice feature to Gmail called Confidential Mode that helps protect sensitive information from authorized access. With Confidential […]
Here’s what to look Forward to, and to Fear, in the next Evolution of the Global Internet. In reality the internet was in many respects a lucky accident. It originated through a collection of US Government technology projects, that somehow grew into a global network. Early enthusiasts envisioned the internet as a free and open […]
A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware. This malware has been detailed by cybersecurity researchers at AT&T Alien Labs, they call it Shikitega. This malware targets endpoints and Internet of Things devices that run on Linux operating […]