NAO Report Criticises UK Govt. Data Security

Majority of Gamers Lack Confidence in Developers

The National Audit Office has issued a report criticising the UK government’s approach to cyber security. The report says that the GCHQ dealt with 200 “cyber national security incidents” per month in 2015 and that there were 8,995 data breaches in the 17 largest government departments in 2014/15. This news comes just ahead of the UK government […]

Plixer On 9-1-1 Vulnerability

Security researchers have found that a DDoS attack could take down the universal 9-1-1 emergency helpline that provides the most critical services. Warnings about this type of attack have previously been issued by the Department of Homeland Security as well as the FBI. If a DDoS attack targeted an emergency helpline service, 9-1-1’s maximum capacity […]

Unlocking The Code – How To Benefit From Low Code Platforms

Vulnerabilities by Reverse Engineering Code

Software development has long been seen as an important skill. Initially when someone said they wanted to become a software developer, it would require years of training, practice and experience. However, today software development can be carried out by almost anyone with little technical knowledge required. The rise in low code platforms is fuelling this […]

Russian Hackers Leak Simone Biles And Serena Williams Files

The World Anti-Doping Agency (Wada) has condemned Russian hackers for leaking confidential medical files of star US Olympic athletes. Athletes affected include tennis players Venus and Serena Williams and teenage gymnast Simone Biles. A group calling itself “Fancy Bears” claimed responsibility for the hack of a Wada database. Mark James, Security Specialist at ESET commented […]

McAfee Labs Report ‘Follows The Money’ To Assess Criminal Operations Behind Hospital Ransomware

Investigation Tracks Hospital Ransomware Payments Through Bitcoin Accounts; Ransomware, Mobile, and Macro Malware Threats Surge in Q2 2016  NEWS HIGHLIGHTS Intel Security tracks $100,000 in targeted hospital ransomware payments through suspect Bitcoin accounts; investigates operations of $121 million ransomware network Intel Security survey shows healthcare and manufacturing sectors are among the least prepared to prevent […]

IoT Security Risks: How People Can Protect Their Network Of Devices

The IoT (Internet of Things), once a buzzword for marketing is now the intelligence in action. Seeping its roots into Artificial Intelligence and Big Data Analytics, major companies like Intel, Verizon, Telenor has now keen interest in pursuing IoT. So, what is Internet of Things? At its core, IoT is a concept of connecting our […]

VoIP Talk Admits Possible Data Breach

Data Breach Responsibility

UK-based IP Telephony service VoIPtalk warned customers of a potential data breach over the weekend. The firm has implemented tighter security controls and advised customers to change their passwords in response to the suspected hacker incident, which is still under investigation. Mark James, Security Specialist at ESET commented below. Mark James, Security Specialist at ESET: […]