Saturday, July 20, 2019

10 Most Neglected Data Security Best Practices

The 2018 Netwrix IT Risks Report explores how organizations are working to ensure compliance and beat cyber threats. Unfortunately, the results indicate that organizations aren’t doing enough to defeat the bad guys. Here are the 10 most neglected security best practices:  1. Classify data based...

Weary Eyes And Fictitious Faces: Why Fingerprints Are Best For Biometric Authentication

Biometric technology is already revolutionising both physical and cyber-security in the UK. While the latest breakthroughs are impressive, we’re only just touching the tip of the iceberg. Regardless of which method we’re using – whether it is fingerprint, facial, retinal or...

Four Questions Organisations Need To Ask After A Cyber Attack

Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break their business. Have they got all the answers, and do they fully understand the implications? Can they be sure the attack won’t happen again?  Swift and...

Online Dating Can Benefit From Identity Verification And Biometric Authentication In 2019

When it comes to fraud, consumers will likely think of common threats like identity theft, credit card fraud, fraudulent bank transactions — the list goes on. However, cybercriminals are constantly evolving, and now online dating sites and applications are...

Data Protection: More Than Data Loss Prevention

Regardless of whether your organisation jumped into cloud enthusiastically, or is being dragged in against its own policies, we are all in the cloud – and we are only going to get more involved.  To talk about preventing data...

New DoppelPaymer Ransomware Surfaces From Old BitPaymer’s Code

According to this link,, malware researchers have discovered a new file-encrypting malware they dubbed DoppelPaymer that has been making victims since at least mid-June, asking hundreds of thousands of US dollars in ransom.  There are three confirmed victims of this ransomware strain,...

How Can Organisations Effectively Manage, Detect And Respond To A Data Breach?

78% of businesses cite cyber security as a high priority for their organisation’s senior management. Whilst it is encouraging that this figure has risen year on year, generating awareness of cyber security is only one part of the issue. The next step...

What Is Doxxing And How To Avoid Getting Doxxed?

Doxxing is revealing and publishing someone’s personal information. This information is collected through various means and is combined together to create a complete profile of personal data. Though this is a popular technique used by hackers for more than...

Wounded By The Cutting Edge: Why Firms Must Be Cautious Of Integrating Emerging Tech Solutions

For the last few years, digital transformation within the tech sector has seemed akin to the opening of Pandora’s box: seemingly overnight firms have begun to be bombarded with AI driven solutions, the possibilities of commercial drones, edge computing,...

The Security Implications Of 5G: What You Need To Know

5G is being touted as revolutionary due to the massive download speeds that consumers can expect when it is rolled out at full strength. Samsung is calling it “wireless fiber” and in addition to providing smartphone users with better...

Dubai 2020

If you are looking for a development that goes well beyond your wildest imagination in all aspect – then you need to take a look at Dubai with its elaborate and stylish building pushing up from the sands with...

Me, Myself And I: Protecting Consumer Identities

The sustained popularity of social media has meant that many of us are happy to make our online identity a digital reflection of our true selves. However, by putting every aspect of our lives online – from where we...

Marrying The Opportunity Of 5G With Security Considerations

As we take each new mobile network generation in our stride, it can be easy to forget just how far we’ve come. For instance, both 3G and 4G were digital transformations in their own right. First allowing for multimedia...

Security, Democracy And Digital Identity

Security, Democracy and Digital Identity We are facing several grave threats, some real and imminent, some theoretical or imaginary.  At the top of the imminent threats list is probably the climate change, which is also viewed as an existential risk. We...

Why Fraud Detection Needs A Reboot

Fraud occurs every day across a variety of industries, causing trillions in losses each year. While financial services and banking are among the hardest-hit industries, other frequent targets include retail, health care, information technology, government/public administration and utilities. In some segments, fraud has...

Cisco Patches Critical Flaw in Vision Dynamic Signage Director

Cisco this week released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability that could allow attackers to execute arbitrary actions on the local system.  Tracked as CVE-2019-1917, the vulnerability was found in the REST...

The Great Hack: the film that goes behind the scenes of the Facebook data scandal

This week, a Netflix documentary on Cambridge Analytica sheds light on one of the most complex scandals of our time. Carole Cadwalladr, who broke the story and appears in the film, looks at the fallout – and finds ‘surveillance...

Scotland Yard Twitter and Emails Hacked

London's Metropolitan Police apologised Saturday after its Twitter, emails and news pages were targeted by hackers and began pumping out a series of bizarre messages. read more

Browser Extensions Scraped Data From Millions of People

Slack passwords, NSO spyware, and more of the week's top security news.

Hackers breach FSB contractor, expose Tor deanonymization project and more

SyTech, the hacked company, was working on research projects for the FSB, Russia's intelligence service.