Luke Irwin Archive
You might be surprised to learn that CCTV footage is subject to the GDPR (General Data Protection Regulation). Its rules don’t only cover written details, like names and addresses; it applies to any information that can identify someone. That includes pictures …
Welcome to our August 2023 catches of the month feature, in which we explore the latest phishing scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we have a pair of stories …
Vishing is a type of phishing scam that takes place over the phone. Vishing attempts to con potential victims into surrendering personal information such as passwords, card details and PINs, which can be used for identity theft. How does vishing work? In …
IT Governance found 87 publicly disclosed security incidents in July 2023, accounting for 146,290,598 breached records. You can find the full list below, divided into four categories: cyber attacks, ransomware, data breaches, and malicious insiders and miscellaneous incidents. Also be …
Fraudsters have countless tricks up their sleeves to bypass security measures and access sensitive information. In most cases, this refers to cyber crime, but scammers might also gain physical access to their premises in tailgating attacks. Although it’s a much …
Twelve Norwegian government ministries have fallen victim to a cyber attack, according to a press release issued on Monday. It’s the latest in a series of attacks against the country, with some reports suggesting that it could be linked to …
Smishing is a type of phishing attack that’s conducted using text message services. These types of scams can target people in their personal and professional lives. Attackers can imitate friends, strangers and organisations, but they can also appear as colleagues …
Red team cyber security assessments are a crucial way of giving organisations a practical understanding of their defence capabilities. In these exercises, the red team faces off against their counterparts, the blue team, in a battle to control a particular …
Welcome to our second quarterly review of cyber attacks and data breaches for 2023. In this article, we take a closer look at the information gathered in our monthly list of security breaches, and delve into the infosec landscape over the …
Welcome to our July 2023 catches of the month feature, in which we explore the latest phishing scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at the increase in a …