AI will supercharge phishing attacks AI won’t just be used by the good guys. In 2018, we will start to…
Browsing: Malware and Vulnerabilities
According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error.…
Wide spread cryptocurrency mining Cryptocurrency mining will become one of the major monetisation avenues for attackers as more and more…
Nine out of 10 employees use USB devices, but only 20 percent of them are leveraging encryption POWAY, CA –…
VULNERABILITY DESCRIPTION A team of researchers, including Tripwire VERT’s Craig Young has announced that TLS stacks from at least 8 different vendors are…
Dark web monitoring firm 4iQ discovered a massive trove of 41GB data file containing 1.4 billion login credentials including emails and passwords in clear-text format.…
Security blossoms in the boardroom Sadly, security breaches will continue to be a regular occurrence in 2018 and organisations will…
Research shows that, on average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Ransomware is a…
Cloud based recovery is growing at a phenomenal rate Over the past few years businesses have been buying cloud based recovery like it’s going out…
A critical security bug was discovered in major banking apps used by HSBC, NatWest and Co-op which could let hackers…