News

  • Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC

    PRIVACY PRIVACY A secure by design approach is vital to protecting the internet of things (IoT) and smart cities, according to Lindy Cameron, CEO of the UK National Cyber Security Centre (NCSC). Cameron spoke during Singapore International Cyber Week, calling for swift ongoing action to ensure connected devices are designed, built, deployed, and managed securely…

    Read More

  • Iran’s nuclear energy agency confirms email server hacked

    PRIVACY PRIVACY The Atomic Energy Organization of Iran on Sunday confirmed that an email server at its  Bushehr Nuclear Power Plant was hacked. The organization blamed a foreign country, but an Iranian hacking group that goes by the name Black Reward has claimed responsibility for the breach. The Atomic Energy Organization said that the IT…

    Read More

  • On the Randomness of Automatic Card Shufflers

    PRIVACY PRIVACY Many years ago, Matt Blaze and I talked about getting our hands on a casino-grade automatic shuffler and looking for vulnerabilities. We never did it—I remember that we didn’t even try very hard—but this article shows that we probably would have found non-random properties: …the executives had recently discovered that one of their…

    Read More

  • Amid real estate volatility, cybercriminals are profiting

    PRIVACY PRIVACY This blog was written by an independent guest blogger. It is easy to think of cybercrime as a phenomenon only impacting the digital space. However, as trends are showing, digital attacks have a very real and very physical impact. According to the FBI, there has been a surge in rental and real estate property…

    Read More

  • Clicker Malware Garners Estimated 20 Million Downloads

    PRIVACY PRIVACY Google forced to remove over a dozen malicious apps Read More

    Read More

  • UK Construction Biz Fined £4.4m for Serious Security Failings

    PRIVACY PRIVACY Interserve slammed by regulator after employee data breach Read More

    Read More

  • When CISOs are doomed to fail, and how to improve your chances of success

    PRIVACY PRIVACY There’s a joke cryptographer Jon Callas likes to tell: CISO stands for Chief Intrusion Scapegoat Officer, “because CISOs are often thrown into a position where they can’t succeed.” Callas, who is the director of public interest tech at the Electronic Frontier Foundation, says that security officers are often “simultaneously in charge and powerless.”…

    Read More

  • European Police Warn of Metaverse Cyber-Threats

    PRIVACY PRIVACY Cops also identify opportunities to enhance law enforcement Read More

    Read More

  • Top Signs of Identity Theft

    PRIVACY PRIVACY When it comes to identity theft, trust your gut when something doesn’t feel right. Follow up. What you’re seeing could be a problem.   A missing bill or a mysterious charge on your credit card could be the tip of an identity theft iceberg, one that can run deep if left unaddressed. Here, we’ll look at several signs of identity theft that likely need some investigation and…

    Read More

  • How to Spot Fake Login Pages 

    PRIVACY PRIVACY Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals.   Fake Login Pages Explained   A fake login page is essentially a…

    Read More

News, Advisories and much more

Exit mobile version