A recently uncovered phishing campaign, targeting PayPal users, pulls out all the stops and asks victims for the complete spectrum…
Browsing: Identity and Access Management (IAM)
What makes for a successful cyberattack? Technology is one part of the picture, clearly. Malicious cybercriminals make use of a…
Under UK law, it’s an employer’s duty to protect the health, safety and welfare of their employees and other people…
GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam…
The Telegraph is reporting Facebook knew about a huge security flaw that let hackers to steal personal data from millions of…
The personal information of over six million citizens was leaked after Benjamin Netanyahu’s Likud party uploaded the full register of Israeli…
Reaching out to make sure you saw breaking news of a phishing campaign resurfacing the Android banking trojan dubbed Anubis, luring users…
As reported by Scamicide, there is a new phishing scam riding on the back of Google Docs attachments. A phishing email…
Dundee and Angus College has remained closed today after a recent cyber attack, which occurred late last week. The College…
Linear eMerge E3 devices that are part of access control systems for Smart buildings have been found to contain serious…