perm_phone_msgUNDER ATTACK? S.O.S. LINE 0114 354 0054

Top Categories

Spotlight

today26/01/2021

Cyber security TechRepublic

Privacy budgets soared in 2020, doubling to an average of $2.4 million

93% of organizations turned to privacy teams to help navigate the COVID-19 pandemic, a new Cisco report finds. Image: Cisco Data privacy has become a top area of responsibility for security professionals, and 34% of respondents to a survey indicated privacy is one of their core competencies and responsibilities. More [...]

Top Voted
Sorry, there is nothing for the moment.

Cyber security

1290 Results / Page 137 of 144

Background

today12/06/2020

  • 1
close

Cyber security ITPro.

How to protect your remote workforce

With the rise of flexible working comes the ever-evolving issue of IT security. Companies with employees working remotely need to adopt a different approach to their security, but many organisations aren’t investing in adequate security and are overlooking key threats. It’s one thing to keep an eye on security when ...

today12/06/2020

  • 7
close

Cyber security ITPro.

The top 12 password-cracking techniques used by hackers

Passwords are the bane of any cyber security expert’s existence. They’re typically easy to crack, often reused and, in today’s era of biometrics and cryptography, are an antiquated way of protecting an account. Unfortunately, it’s this ease of use that means passwords are still the primary method of user authentication, ...

today12/06/2020

close

Cyber security The Register

Trend Micro pulls another app over security fears: This time, the Privacy Browser in the Dr Safety Android suite

Trend Micro has pulled the Privacy Browser from its Dr Safety Android security suite following the discovery of a reoccurring flaw that could be abused to trick people into thinking malicious pages were legit. Security consultant Dhiraj Mishra discovered and privately reported the vulnerability to the software maker in April. ...

today11/06/2020

  • 2
close

Cyber security The Register

Forget biz insider threats for a moment – let’s talk about partners turning rogue and installing spyware on phones

Analysis Cybersecurity vendors have long warned of insider threats in corporate environments, but less attention has been paid to an insider threat closer to home: abusive partners and family members. In a paper recently published through the Journal of Cybersecurity, Cornell University assistant professor Karen Levy and security veteran Bruce ...

today11/06/2020

  • 2
close

Cyber security The Register

Russia-linked Gamaredon hacker crew using Microsoft’s Visual Basic for Applications to pwn Microsoft’s Outlook

Security researchers claim to have uncovered “several previously undocumented post-compromise tools” used by a Russia-linked APT to target Microsoft Office and Outlook through Visual Basic for Applications. In a statement about its findings, Slovakian infosec biz ESET said the tools “inject malicious macros or references to remote templates into existing ...

today11/06/2020

  • 15
close

Cyber security The Register

How to scale endpoint management, improve employee productivity and reduce costs

Sponsored Life is getting more complicated for IT professionals responsible for managing endpoint hardware. An expanding number of devices are connecting to the corporate network and the diversity of device types is also growing. This can include workers with business laptops to point-of-sale (PoS) terminals, digital signage systems and numerous ...