The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root…
Browsing: Identity and access management (IAM)
Following the news that there are more cyber attacks in north Wales than street crime, David Emm, Principal Security Researcher…
With consumers’ personal data being compromised on a near daily basis, it is unsurprising that the EU is preparing to…
Multple outlets such as HelpNetSecurity blog are reporting that a New Gmail Phishing Technique Fools Even Tech-Savvy Users. An effective…
After days of wreaking havoc among MongoDB servers, a group of crooks has moved on to hijacking ElasticSearch servers and…
Social media started life as a way of staying in touch with friends and sharing happy memories. However, the results…
Reports are surfacing that the largest NHS hospital trust in England has been hit with ransomware, affecting thousands of sensitive files.…
For every problem, there is a solution. In the world of cyber security, however, if each and every problem is…
A serious vulnerability is discovered in Whatsapp’s end-to-end encryption that allows allow Facebook and others to intercept and read encrypted…
The widespread attack on MongoDB databases is gathering speed, with reports that close to 50,000 databases are vulnerable. MongoDB does…