Tag Archives: Security

Kim Kardashian is the riskiest celebrity to search for online

      Comments Off on Kim Kardashian is the riskiest celebrity to search for online

According to research carried out by cyber security firm McAfee, Kim Kardashian is the riskiest person to search for online in the UK. The research measured how many potentially malicious sites were found in the search results for celebrity names. Supermodel Naomi Campbell and Kourtney Kardashian, Kim’s sister, took the… Read more »

Share

California bill mandates stronger passwords

      Comments Off on California bill mandates stronger passwords

Internet-connected devices being sold in California will need stronger passwords from 2020. The state’s Information Privacy: Connected Devices bill mandates that default and easy-to-guess passwords, such as “admin” and “password,” will no longer be allowed, reports the BBC. Instead, all devices must be given a unique password when they are… Read more »

Share

Banks go to war on cybercrime

      Comments Off on Banks go to war on cybercrime

With cyberspace the new global battlefield, the finance sector is finding itself in the firing line; and it’s having to draft in appropriate personnel to fight back – many of them former soldiers, spies or counter-intelligence agents. With cybercrime losses now amounting to $445 billion per annum, the need for… Read more »

Share

Are your emails secure?

      Comments Off on Are your emails secure?

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol for sending digitally signed and encrypted messages. So far, so good. Unfortunately, if you use Microsoft Outlook to send secure emails, any set-up employing S/MIME may not be encrypted after all – leaving the email contents wide open to snoopers. The trouble… Read more »

Share

The smartphone – your new flexible friend

      Comments Off on The smartphone – your new flexible friend

Not content with managing almost every aspect of our daily life, it looks as if smartphones are poised to become our main method of paying for our purchases. Businesses are constantly striving to find new ways to make it easy for customers to pay, while at the same time reassuring… Read more »

Share

Exploit broker ups its payout rates for tip offs

      Comments Off on Exploit broker ups its payout rates for tip offs

Zerodium is an American information security company that buys premium zero-day vulnerabilities from security researchers and then reports the research, along with protective measures and security recommendations, to its corporate and government clients. As part of its newly-published menu of rewards, Zerodium has recently announced that it will be paying… Read more »

Share

Worrying shortage of cybersecurity staff

      Comments Off on Worrying shortage of cybersecurity staff

When it comes to choosing a career in the world of cyber, security seems to be a less attractive option than hacking – judging by the severe shortage of qualified cybersecurity recruits. Just as there were ‘two girls for every boy’ for Jan and Dean, according to anti-virus guru John… Read more »

Share

The simple way for SMEs to stay cybersafe

      Comments Off on The simple way for SMEs to stay cybersafe

By taking preventative measures, the world has largely wiped out diseases such as smallpox, polio and malaria. The next big challenge is to eradicate cyber crime. Almost four million cyber crime offences were committed in Britain last year, accounting for nearly 40% of all recorded criminal incidents. SMEs with finite… Read more »

Share

Shhh! Alexa can hear you

      Comments Off on Shhh! Alexa can hear you

Is your friendly Amazon Echo serving your every whim and need – or is it spying on you? A British researcher has found a simple way of using malware and an SD card to convert an innocent speaker into a secret bugging device. In a time where voice-activated digital assistants… Read more »

Share

How hackers can cache in

      Comments Off on How hackers can cache in

Information security specialist Omer Gil has come up with an ingenious method of conning a web server into exposing personal data through a caching attack. Any sites that use content delivery network (CDN) services are vulnerable to this new threat. Gil’s idea, showcased at Black Hat Conference, demonstrates how an… Read more »

Share