Uncategorised Archive
Vishing is a type of phishing scam that takes place over the phone. Vishing attempts to con potential victims into surrendering personal information such as passwords, card details and PINs, which can be used for identity theft. How does vishing work? In …
Fraudsters have countless tricks up their sleeves to bypass security measures and access sensitive information. In most cases, this refers to cyber crime, but scammers might also gain physical access to their premises in tailgating attacks. Although it’s a much …
IT Governance found 79 publicly disclosed security incidents in June 2023, accounting for 14,353,113 breached records. You can find the full list below, divided into four categories: cyber attacks, ransomware, data breaches, and malicious insiders and miscellaneous incidents. Also be …
Cyber criminals have many sophisticated techniques to hack people’s devices and steal their login credentials, but one of their most successful methods is also their simplest: brute force. In this blog, we explain how brute force attacks work, why they …
This week, we discuss the apparent sale of exfiltrated Capita data by the Black Basta ransomware group, a zero-day Google Chrome vulnerability and the development of a new LockBit ransomware variant targeting macOS, and Alan Calder analyses the new US …
This week, we discuss the European Parliament Committee on Civil Liberties’s opinion of the EU-US Data Privacy Framework, Twitter’s decision to disable free text-based 2FA, a series of attacks on GoDaddy’s infrastructure and the HardBit 2.0 ransomware group’s negotiation tactics. …
This week, we discuss a Which? investigation into basic security flaws on banks’ websites and apps, a ransomware attack on the financial firm ION Cleared Derivatives, and a phishing attack that compromised the emails of Stewart McDonald MP. Now available …
Data protection is something that affects almost everything that we do. From checking our phones first thing in the morning to logging in at work, from high-street shopping to monitoring our biometric data at the gym, we are constantly handing …
Organisations rightly put a lot of effort into cyber security, but what happens when their defences fail? It’s an essential question in the modern business landscape, because cyber crime is rife and there are countless vulnerabilities to manage. It only …
Physical security in the workplace is a dying artform. With our growing reliance on technology and the rise in remote working, we are leaning more on cyber security and neglecting the protection of tangible assets. Although many workers still go …