The significant threat cyber attacks represent to commerce and infrastructure is intensifying calls for government to “encourage” companies and agencies…
Browsing: Identity and access management (IAM)
As a business owner, you’re responsible for the safety of your employees and patrons. Ask yourself: Do your customers and…
Following the news that Wonga, the payday lender has experienced a data breach that may affect up to ‘245,000 UK…
Banking as we know it is finished, affirms the boss of one of the world’s largest independent financial advisory organisations,…
In the current cybersecurity threat landscape, most botnets propagate via exploits and file-based malware. Anything that touches the disk has…
Sathurbot: Distributed WordPress password attack This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its…
Late last year on the eve of a $4.8B sale to Verizon, Yahoo announced that its servers had been breached…
Researchers have uncovered a rash of ongoing attacks designed to damage routers and other Internet-connected appliances so badly that they become effectively…
Following the news that Anonymous members who wanted to participate in this year’s annual #OpIsrael cyber-attacks were the targets of an…
Following the news about hack attacks from China have been targeting UK firms. Graeme Newman, Chief Innovation Officer at CFC Underwriting provides an…