Smartphones, watches, televisions and fitness trackers could be used to hold people to ransom over personal data, cyber security experts…
Browsing: Data Protection
Now that the Internet of Things is clearly here to stay, it’s become an attractive target for cybercriminals. While the…
Rapid7 disclosed multiple vulnerabilities with the Telepresence Robot from Double Robotics, a mobile conferencing device that allows the remote user to roam…
In today’s world, not being able to see potential threats to applications is fatal for business where data is king.…
Personal data of thousands of NHS staff members in Wales was breached from the servers of third-party contractor Landauer last October. The breached…
If you are reading this, you already know what GDPR is and why it is so important that your organisation…
WikiLeaks released a trove of documents this week alleging that CIA agents undertake major efforts to circumvent user encryption, resorting…
According to the recent Wikileaks documents, British spy agencies worked with the CIA to turn televisions and smart phones into…
Following the news about the FBI Director James Comey’s recent remarks with regards to encryption and how it threatens to…
On Tuesday, 7th March, WikiLeaks published thousands of documents. The documents are alleged to show tactics and tools employed to, among…