Businesses are facing substantial risks to their finances and data as cyber criminals use information from social media and company…
Browsing: Breaches
Hackers were able to infiltrate an ICS/SCADA system at a water treatment plant and altered crucial settings that controlled the…
Every day, across the UK around 1.5 million professionals work from home; more productive, happier in their role and measurably…
New Lieberman Software Poll Reveals Overwhelming Negative Attitude Toward Effectiveness of Passwords Passwords are a cornerstone method for securing access…
Security procedures are vital in many areas of every day life. Across the globe, busy airports ensure crew and passengers…
In an episode of the TV show “Sherlock,” a pair of bad guys die in a crash after a hacker…
A hacker has gained access to Adele’s personal photos and released them, including a pregnancy scan of her son. The…
Talktalk have announced that they will be using voice recognition in place of passwords as a result of the data…
Huge demand for security automation driven by the growing number and sophistication of cyber threats, business transformation initiatives, and security…
Following the news that an ex-Ofcom employee has stolen and shared confidential company data with his new employer, here to…