News

22nd August 2017 - Admin - 0 comments

In the current era of security threat attacks and cyber warfare, it comes as a vital need to persistently monitor and scrutinize the ongoing threats and day-to-day malicious activities.

22nd August 2017 - Admin - 0 comments

Effective planning of log-monitoring activities starts with a thorough understanding of organization legal, regulatory, business, and operational requirements. The technical capabilities of the organization systems should be monitored through the available technologies.

22nd August 2017 - Admin - 0 comments

The Cyber-threat attacks faced by Organizations are increasing in diversity and continue to evolve due to the vast motivations behind them and the complex innovation in attack techniques.

14th August 2017 - Admin - 0 comments

The Cyber London Conference  http://clc2017.co.uk/  brings together government, companies, and organizations both from the private and public sectors on one platform. The agenda of the meet is to discuss and share the latest Cyber Security Solutions. One can explore the latest threats and challenges within the Cyber Security Sector.

14th August 2017 - Admin - 0 comments

Security researchers have found a new form of malware which is targeting Android devices, posing as a Flash update that needs to be installed as soon as possible. According to experts, the fake update includes a form of malware known as "Invisible Man" officially flagged as Andr/Banker-GUA. It is based on a Svpeng malware which was first detected in 2015. As the name suggests, Invisible Man malware runs silently on infected devices unknown to the user.

14th August 2017 - Admin - 0 comments

Kaspersky Lab researcher Vitaly Kamluk has released the source code of Bitscout, a compact and customizable tool designed for remote digital forensics operations. In most cyber attacks, legitimate owners of compromised systems usually agree to cooperate and help security researchers find the infection vector or other details about the attackers

11th May 2017 - Admin - 0 comments

A report by McKinsey shows technologies available today could automate 45% of the activities people are paid to perform.

11th May 2017 - Admin - 0 comments

The market for Big Data & Data Analytics products for use in Homeland Security is growing fast and will be worth $11 Billion by 2022.

11th May 2017 - Admin - 0 comments

Using unique feature recognition capabilities, FaceFirst's new airport security platform identifies visitors in high traffic areas

11th May 2017 - Admin - 0 comments

As AI becomes more powerful, people need to make sure it's not used by authoritarian regimes to centralise power & target certain populations.

11th May 2017 - Admin - 0 comments

People in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers & fraudsters. 

5th May 2017 - Admin - 0 comments

Although we live in a world where data transfer is easy from a technical standpoint, data location is increasingly important from a legal perspective.

5th May 2017 - Admin - 0 comments

Cyber Security Breaches Survey 2017: Virtually all UK businesses surveyed are exposed to some kind of cybersecurity risk.

5th May 2017 - Admin - 0 comments

Directors find themselves in unfamiliar territory when it comes to formulating policies & oversight processes that address cybersecurity risk. 

5th May 2017 - Admin - 0 comments

A new UK research centre to tackle cyber attacks, protect corporate IT networks. IP and critical  infrastructure has opened in Cardiff.

5th May 2017 - Admin - 0 comments

Don't let cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organisation from attack.

2nd May 2017 - Admin - 0 comments

UK security services have issued a series of alerts warning that terrorists may have developed ways of bypassing safety checks.

2nd May 2017 - Admin - 0 comments

Cyber criminals are increasingly turning their attention from attacks against private users to targeted ransomware attacks against businesses.

2nd May 2017 - Admin - 0 comments

Employee turnover comes with a variety of corporate, logistical and financial hurdles. They also create data protection & security problems.

2nd May 2017 - Admin - 0 comments

Cybersecurity is changing from a technical problem to being a risk-based issue. Security leaders stuck in reactive mode who do not adapt will fail. 

2nd May 2017 - Admin - 0 comments

Phishing, spear-phishing, whaling, ransomware, hacking, hacktivism, corporate espionage. Attacks are becoming more insidious and sophisticated.

24th April 2017 - Admin - 0 comments

The systems that run the US electricity grid, gas pipelines & other critical infrastructure have 25 years' worth of vulnerabilities that need fixing.

24th April 2017 - Admin - 0 comments

Major US insurer Anthem wants reviews of computer usage by customers seeking damages to determine if it is solely their client's fault.

24th April 2017 - Admin - 0 comments

If network administrators implement these seven basic precautions they could prevent as many as 85 percent of targeted cyber attacks.

24th April 2017 - Admin - 0 comments

A common source for numerous large scale data breaches are poorly secured databases that connect directly to the internet.

24th April 2017 - Admin - 0 comments

A new spam campaign has emerged using the TeamSpy data-stealing malware which gives cybercriminals full access to compromised computers.

16th April 2017 - Admin - 0 comments

Company boards have a pressing fiduciary responsibility to promote & support development of robust cybersecurity programmes.

16th April 2017 - Admin - 0 comments

Europe's computer security agency has set out a list of the top online threats with a warning that hacking for profit is the biggest trend

16th April 2017 - Admin - 0 comments

A tiny coding bug has led to an unknown quantity of data, passwords, personal information, messages & cookies, to leak all over the Internet.

16th April 2017 - Admin - 0 comments

A new spam campaign has emerged usiing the TeamSpy data-stealing malware which gives cybercriminals full access to compromised computers

16th April 2017 - Admin - 0 comments

Britain is making a £17m investment in expectation that the rise of the machines will boost the economy as it exits the European Union

7th April 2017 - Admin - 0 comments

Britain's new cybersecurity chief says attacks by Russian and Chinese sponsored hackers have 'threatened national security'

7th April 2017 - Admin - 0 comments

Computer scientists have developed tiny computers to make smarter, smaller sensors for medical devices and the IoT using much less energy.

7th April 2017 - Admin - 0 comments

Using threat intelligence from others to protect your own organisation is a powerful concept - except when the other data is misleading or wrong.

7th April 2017 - Admin - 0 comments

Hong Kong has suffered its biggest ever data breach after the personal details 3.7 million voters were lost on stolen laptops.

7th April 2017 - Admin - 0 comments

More than half of British businesses fell victim to some form of cybercrime in 2016 at a cost of £29.1 billion.

30th March 2017 - Admin - 0 comments

A new terror alert smartphone app released worldwide providing users real-time information during a terrorist attack.

30th March 2017 - Admin - 0 comments

Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks.

30th March 2017 - Admin - 0 comments

Over 70% of the world's population will live in urban areas by 2050 - but don't think that means you will be able to get lost in the crowd.

30th March 2017 - Admin - 0 comments

Airplane Mode: Advances in electronics now mean that just about anything with a power source can be turned into an explosive.

30th March 2017 - Admin - 0 comments

Many large companies would prefer to pay ransom to avoid public shaming and the other devastating public consequences of a security breach.

28th March 2017 - Admin - 0 comments

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that's very difficult to detect. 

28th March 2017 - Admin - 0 comments

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

28th March 2017 - Admin - 0 comments

The banking giant wants to capitalise on opportunities in AI, biometrics, blockchain and data science, using its global reach to fight cybercrime. 

28th March 2017 - Admin - 0 comments

Insider cyber threats are a major security problem and the highest level of risk to data security is not external but lies within an organisation.