As we enter a new decade, the security landscape never ceases to change and evolve, both on a macro and micro level. This is compounded by the fact that the remit of the security professional not only continues to expand to meet new threats, but…
Passwords
-
-
Outdated camera firmware and the failure to change default passwords are two of the biggest weaknesses when it comes to organisations’ cyber security defences in the surveillance arena. As the number of interconnected security devices continues to grow, keeping pace with the latest updates can…
-
A website which sold a hacking tool purchased by cyber criminals in 124 countries and gave full remote control of victims’ computers has been taken down following an international investigation. 14,500 people across the world purchased the Imminent Monitor Remote Access Trojan (IM RAT) from https://imminentmethods.net for…
-
Liv Rowley, threat intelligence analyst at Blueliv, has shared details of the company’s predictions on the biggest cyber threats likely to develop in the New Year, from account checking Armageddon through to Monero cryptocurrency mining. With users continuing to re-use the same passwords across multiple services,…
-
Checkpoints at airports have always been an object of passenger discontent with both document and immigration checks consistently receiving the lowest scores in passenger satisfaction surveys. Biometric technology has long been hailed as the ‘silver bullet’ to solve airport checkpoint-focused issues, improving processing speed, accuracy…
-
LastPass by LogMeIn has issued the results of its third annual Global Password Security Report: a study that offers insights into employee password behaviours as well as emerging trends around identity and access management at businesses worldwide. Among the key findings from this year’s report…
-
As a Chief Information Security Officer (CISO), you’re likely to have put forward many plans designed to improve the overall security posture for the users of your organisation. Much of the time, you’ll receive executive sign-off and then roll out whatever initiative it might be.…
-
LastPass by LogMeIn has announced the results of a new study conducted by Vanson Bourne to offer businesses insights into the state of identity and access management (IAM) and actionable steps to improve their IAM programme. The study, entitled ‘The Guide to Modern Identity’, surveyed…
-
The potential risks and vulnerabilities posed by using Internet of Things (IoT) systems and connected devices, along with IoT security Best Practice and guidelines, will be up for discussion at Secure IoT 2019. The third annual Secure IoT Cyber Security Conference will be held on…
-
Technology used in exercise and lifestyle apps may hold the key to answering that most difficult of challenges – making sure people change their passwords and better protect their online privacy and data. Taking inspiration from exercise and fitness apps that successfully ‘nudge’ people to…