“The next generation of wireless technology is here. 5G will enhance connectivity across all platforms, providing more efficient, higher bandwidth…
Browsing: Malware and Vulnerabilities
Security teams spend significant amounts of time and effort to fend off phishing email attacks, yet the lengthy timeframes needed…
Online scams are increasingly prolific because they piggyback on human weaknesses rather than software vulnerabilities that take significant effort to…
The scourge of ransomware is mutating into a phenomenon with two-pronged extortion at its core. It used to rely solely…
“With the COVID-19 pandemic continuing to rage across the world, governments of many countries have encouraged or demanded that employees…
A recent English High Court decision means that extorted cryptocurrency payments may now be recovered by obtaining an injunction. The…
It has been reported that GoDaddy suffered a data breach in October and has notified the Californian authorities, stating that an unauthorised…
As global economies continue in the fight against COVID-19, millions of people around the world are working from home to…
Most people associate a cyber-attack with things like phishing, exploitation of software vulnerabilities, RDP hacks, and sketchy websites hosting malicious…
F5 Labs assesses three years of Security Incident Response Team data Financial services organisations have experienced a significant increase in…