01242 507100

Archive of: February, 2016

  • 
        Human Exploitation the Biggest Threat of 2015

    Human Exploitation the Biggest Threat of 2015

    One of the most significant findings from the study is that in 2015 people were the targets: from email and web to social media and mobile apps, rather than relying on expensive exploit kits, attackers relied on human frailty to carry out their dirty work.

    Read more
  • 
        Apple vs the FBI - a plain English guide

    Apple vs the FBI - a plain English guide

    Apple chief executive Tim Cook says the FBI’s court order to access the mobile phone of San Bernardino killer Syed Farook is "dangerous", "chilling" and "unprecedented". The FBI says Apple’s lack of co-operation is hindering its investigation. Here’s a plain English guide to the debate, and an explanation of what may happen next.

    Read more
  • 
        Women write better code, study suggests

    Women write better code, study suggests

    Computer code written by women has a higher approval rating than that written by men - but only if their gender is not identifiable, new research suggests.

    Read more
  • 
        Online Dating Fraud Warning Ahead of Valentine’s Day

    Online Dating Fraud Warning Ahead of Valentine’s Day

    News of major online dating scams seem to break every few months. Back in December it was revealed by the Met that a woman in her 40s was tricked into handing over a staggering £1.6 million to scammers she met online.

    Read more
  • 
        Top 50 InfoSec Blogs You Should Be Reading

    Top 50 InfoSec Blogs You Should Be Reading

    Digital Guardian scoured the far corners of the web to dig up some of the best, most insightful and informative InfoSec blogs in existence. Not only the blogs you’ve seen named time and time again in best-InfoSec-blogger lists, but also some hidden gems you may not have known existed but will be glad you’ve finally discovered. These blogs provide deep insights from some of the leading information security professionals; in-the-trenches viewpoints from security experts who have spent decades working in the field and consulting with the world’s largest enterprises, universities, the U.S. Government, startups, and other entities.

    Read more
  • 
        Breaking the Cybersecurity Glass Ceiling

    Breaking the Cybersecurity Glass Ceiling

    “The information security field is expected to see a deficit of 1.5 million professionals by 2020 if we don’t take proactive measures to close the gap,” says (ISC)² CEO David Shearer. “Knowing this, it is rather frustrating to realize that we do not have more women working in the industry. Only 10 percent of information security professionals are women, and that needs to change.”

    Read more
  • 
        White House to Hire its First CISO

    White House to Hire its First CISO

    The CISO hiring is part of a larger cybersecurity defense plan that will also include a $3.1 billion fund to replace outdated IT infrastructure; a commission to study cybersecurity problems, and a program to recruit cybersecurity experts into government roles.

    Read more
  • 
        Huge rise in hack attacks as cyber-criminals target small businesses

    Huge rise in hack attacks as cyber-criminals target small businesses

    According to the latest statistics released by cyber security firm Symantec, more than half (52.4%) of spear phishing attacks, carried out using fake emails – carried out in December last year were against SMEs, with November showing a massive spike.

    The issue of cyber security for small businesses is made even more pressing by new European regulations aimed at protecting customer data. The EU’s new General Data Protection Regulation will come into force in 2018 and could result in companies being fined up to €20m or 4% of their annual turnover, whichever is greater, for allowing any security breaches to compromise their customer data.

    Read more
  • 
        DDoS: Website-crippling cyber-attacks to rise in 2016

    DDoS: Website-crippling cyber-attacks to rise in 2016

    Cyber-attacks that bring down websites and online services have been getting bigger every year. But how will businesses cope in 2016? Distributed denial of service (DDoS) attacks work by overloading websites or other online services with traffic. They have the power to knock whole sites offline and are usually carried out by automated bots or programs. Victims of such attacks in the past month include the Irish National Lottery and the BBC while in 2014 the popular videogame Wurm was also hit.

    Read more
  • 
        Senior Female Cyber Security Professionals earn more than their Male equivalents

    Senior Female Cyber Security Professionals earn more than their Male equivalents

    Women in senior roles in the industry were shown to earn an average salary of £115,714 whilst their male counterparts earn £97,619. The reason why women earn more is likely due to the fact that there are fewer women candidates available in the talent pool. This is combined with a growing demand for diverse IT and leadership teams so female information security professionals can expect to command a salary premium, especially for senior roles.

    Read more