-
Government Publishes Playbook to Enhance Smart City Security
PRIVACY PRIVACY Resources are designed to help local authorities mitigate risk Read More
-
New Cloud Data Leak Adds to Capita’s Woes
PRIVACY PRIVACY Colchester council says multiple local authorities are impacted Read More
-
Steer Clear of Rip-offs: Top Tips for Safer Online Shopping
PRIVACY PRIVACY Everyone loves a great deal when they shop online. Until they discover it’s a rip-off. Social media ads for vintage wear. Website ads for home entertainment gear. Search ads for handbags. Some of these ads aren’t what they seem. Instead of leading you to deals on a trustworthy ecommerce site, the ads take…
-
Identity Crimes Remain at All-Time High in 2022
PRIVACY PRIVACY Most reports related to Google Voice scams Read More
-
Smashing Security podcast #322: When you buy a criminal’s phone, and paying for social media scams
PRIVACY PRIVACY Personal information is going for a song, and the banks want social media sites to pay when their users get scammed. All this and much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault. Read More
-
IBM acquires Polar Security, bolstering data security capabilities
PRIVACY PRIVACY IBM has purchased application security startup Polar Security, in an attempt to address the security of application data in the cloud and help organizations track vulnerable information. In a statement issued this morning, IBM said that the increased cloud adoption driven by the pandemic has strained organizational capacity to track certain aspects of…
-
Researchers show ways to abuse Microsoft Teams accounts for lateral movement
PRIVACY PRIVACY With organizations increasingly adopting cloud-based services and applications, especially collaboration tools, attackers have pivoted their attacks as well. Microsoft services consistently rank at the top of statistics when it comes to malicious sign-in attempts, and Microsoft Teams is one application that recently seems to have attracted attackers’ interest. Researchers from security firm Proofpoint…
-
Social Engineering Risks Found in Microsoft Teams
PRIVACY PRIVACY The abuse methods require pre-existing access to a compromised user account or Teams token Read More
-
BatLoader Impersonates ChatGPT and Midjourney in Cyber-Attacks
PRIVACY PRIVACY eSentire recommended raising awareness of malware masquerading as legitimate applications Read More
-
Energy Industry Faces Increasing Dark Web Cyber Threats
PRIVACY PRIVACY The claims come from the latest Searchlight Cyber threat intelligence report Read More