Record-breaking year for breaches

      Comments Off on Record-breaking year for breaches

The first half of 2017 has already witnessed more data leaks and thefts than in the whole of the previous year. So far 1.9 billion records have been compromised since January 1st, up from 1.37 billion in the whole of 2016 – that means, on average, every day over 10… Read more »

Share

Equifax compounds data breach fiasco

      Comments Off on Equifax compounds data breach fiasco

Not content with falling victim to one of the worst data breaches in history, leading credit rating firm Equifax has been sending its anxious customers to a fake website to check whether or not they have been compromised. Fortunately for all concerned, the site’s developer had no evil intentions, but… Read more »

Share

Students, beware of SLC phishing scam

      Comments Off on Students, beware of SLC phishing scam

As the new academic year begins, students are looking to organise their finances. Little surprise then, that hackers have decided to use a well established institution, the Student Loans Company, to scam students out of their hard-earned (or their parents’) money. The past few weeks have seen a phishing campaign… Read more »

Share

September Patch Tuesday contains crucial fixes

      Comments Off on September Patch Tuesday contains crucial fixes

In what’s become a regular fixture on the cybersecurity calendar, major tech giants recently issued a welter of updates as part of September’s Patch Tuesday. Adobe has repaired a couple of flaws in its Flash Player, released an update for its RoboHelp help authoring tool and mended four glitches in… Read more »

Share

Which positions are the most phished?

      Comments Off on Which positions are the most phished?

New research suggests that when it comes to business email compromise (BEC) attacks (also known as spear-phishing or simply phishing attacks), hackers most often take on the guise of CEO, managing director and president. Targets are, perhaps unsurprisingly, frequently decision makers in the finance department. The researchers’ analysis turned up… Read more »

Share

Bluetooth leaves gates wide open to cyberattacks

      Comments Off on Bluetooth leaves gates wide open to cyberattacks

Locking our house or car comes as second nature. Switching off our Bluetooth connection when we’re not using it should also be an automatic security measure. Why? Because researchers have identified an attack called BlueBorne that exploits a range of vulnerabilities inherent in Bluetooth’s implementation in several software systems –… Read more »

Share

Credit bureau suffers massive data breach

      Comments Off on Credit bureau suffers massive data breach

Equifax, one of the big three international consumer credit reporting agencies, has recently become the victim of one of the largest data breaches ever. Equifax collects and aggregates information on over 820 million individual consumers and more than 91 million businesses worldwide. It appears that cyber crooks have gained access… Read more »

Share

The smartphone – your new flexible friend

      Comments Off on The smartphone – your new flexible friend

Not content with managing almost every aspect of our daily life, it looks as if smartphones are poised to become our main method of paying for our purchases. Businesses are constantly striving to find new ways to make it easy for customers to pay, while at the same time reassuring… Read more »

Share

Students beware of the Student Loans Company

      Comments Off on Students beware of the Student Loans Company

As the new academic year begins, students are looking to organise their finances. While there is plenty of genuine help on offer, the Student Loans Company is definitely one to avoid. This bogus lender is currently using a phishing scam to steer unsuspecting students to a hoax website with the… Read more »

Share

WikiLeaks suffers DNS hijack

      Comments Off on WikiLeaks suffers DNS hijack

In a classic case of the biter bit, the WikiLeaks website has fallen victim to a Domain Name System (DNS) hijacking – a technique that effectively allows hackers to raid the Internet phonebook. They can then use malicious software to seize control of a website by annexing its human or… Read more »

Share