Liv Rowley, threat intelligence analyst at Blueliv, has shared details of the company’s predictions on the biggest cyber threats likely to develop in the New Year, from account checking Armageddon through to Monero cryptocurrency mining. With users continuing to re-use the same passwords across multiple services,…
Usernames
-
-
The Internet of Things (IoT) is well and truly upon us, and will clearly be even more prevalent in the future, writes Monica Brink. Today, the IoT is already branching out into commercial networks as well as enterprise applications. Smart devices are becoming more commonplace…
-
New data released by Action Fraud and the National Fraud Intelligence Bureau (which are both run by the City of London Police) shows that, increasingly, fraudsters are using phishing as a means to defraud people across the UK. Last year (January-December 2015), the Fraud and…
-
Gemalto Survey: “IT Departments face obstacles to user mobility for fear of data breaches”
by Brian SimsOrganisations are being challenged to meet the demands for greater mobility as 92% of IT Departments worldwide still restrict users from accessing sensitive corporate data and resources from mobile devices. This is according to a recent global survey of 900 IT decision-makers conducted by Gemalto.…
-
GFI Software has released the findings of an independent study examining the business and social impacts of cyber security issues. The results reveal stark public concerns over the increasing personal and business risks posed by cyber crime, and the growing likelihood that acts of cyber criminality…