With the ever-expanding influx of Internet Embedded Technology (IET) within businesses, such as printers, conferencing solutions, building security technology, heating,…
Browsing: Data Privacy
Criminals will always find ways to gain access to PCs without the owner’s permission. They will then use the hacked…
The Hacker’s Playbook Findings Report* reveals that cybercriminals are able to break into enterprise networks with malware on average 60%…
According to research published today by Paul Bischoff, privacy advocate for Comparitech.com, most top VPN applications can leak data during…
According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error.…
An innovative UK first, Bournemouth is accepting digital identity app Yoti as a form of ID, allowing people to leave…
Santa Clara, Calif. – McAfee today announced further collaboration with Samsung to support the back-end for Samsung’s newly pre-installed Wi-Fi protection, Secure Wi-Fi…
Dark web monitoring firm 4iQ discovered a massive trove of 41GB data file containing 1.4 billion login credentials including emails and passwords in clear-text format.…
Dr Guy Bunker, SVP of Products at Clearswift discusses the increasing trend amongst cyber criminals to hold data to ransom…
Security blossoms in the boardroom Sadly, security breaches will continue to be a regular occurrence in 2018 and organisations will…