News

  • Breaking 256-bit Elliptic Curve Encryption with a Quantum Computer

    PRIVACY PRIVACY Researchers have calculated the quantum computer size necessary to break 256-bit elliptic curve public-key cryptography: Finally, we calculate the number of physical qubits required to break the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do…

    Read More

  • Romance Fraud Losses Increased by 91% During COVID-19

    PRIVACY PRIVACY Women made up two-thirds of victims of romance fraud during the pandemic, according to the figures Read More

    Read More

  • What are BEC scams and how to avoid them

    PRIVACY PRIVACY This blog was written by an independent guest blogger. To carry out business email compromise (BEC) fraud, a con artist impersonates an organization’s senior manager, business partner, or supplier and tries to manipulate an employee into transferring money to the wrong destination. The rogue message typically comes from a spoofed or previously hacked…

    Read More

  • UK Foreign Office Subjected to “Serious Cybersecurity Incident”

    PRIVACY PRIVACY Document published on government website revealed unidentified hackers infiltrated Foreign Office systems Read More

    Read More

  • Home Workers More Likely to Be Concerned About Security

    PRIVACY PRIVACY Time for reflection may also increase anxiety and improve awareness Read More

    Read More

  • No Critical CVEs Fixed in February Patch Tuesday

    PRIVACY PRIVACY All vulnerabilities rated “important” with one publicly disclosed Read More

    Read More

  • 3 authentication-level protections for remote users and devices

    PRIVACY PRIVACY Do the traditional techniques of protection still work in the age of work from home? Yes, but you need to use different rules and products. Traditional networks have been set up in the same fashion: a traditional Active Directory domain, a variety of domain controllers, workstations under the control of that domain, and…

    Read More

  • School-Aged Students Urged to Consider New Cyber Qualification

    PRIVACY PRIVACY CIISec’s Extended Project Qualification is open to anyone over 14 Read More

    Read More

  • Microsoft Patch Tuesday, February 2022 Edition

    PRIVACY PRIVACY Microsoft today released software updates to plug security holes in its Windows operating systems and related software. This month’s relatively light patch batch is refreshingly bereft of any zero-day threats, or even scary critical vulnerabilities. But it does fix four dozen flaws, including several that Microsoft says will likely soon be exploited by…

    Read More

  • Microsoft’s February 2022 Patch Tuesday Addresses 48 CVEs (CVE-2022-21989)

    PRIVACY PRIVACY Microsoft addresses 48 CVEs in its February 2022 Patch Tuesday release, including one zero-day vulnerability that was publicly disclosed, but not exploited in the wild. 0Critical 48Important 0Moderate 0Low Microsoft patched 48 CVEs in the February 2022 Patch Tuesday release, with all 48 rated as important and none rated as critical. This month’s…

    Read More

News, Advisories and much more

Exit mobile version