Bitcoin’s 2020 halving took place today. This happens around once every four years and is of much interest to cryptocurrency investors due to the profound effect halving has…
Biometrics are becoming a cutting edge technology in the field of information security and data privacy. Biometrics entertain identification against unique human features. Biometrics being an emerging technology…
Suspected Chinese hackers are behind a phishing campaign apparently aimed at collecting data about Vietnamese government officials amid an ongoing territorial dispute between the two nations, according to…
The volume of attacks on cloud services more than doubled in 2019, in line with the trend of organizations increasingly moving operations to the cloud, according to the 2020…
Two-thirds of remote workers in the UK haven’t received cybersecurity training over the past year, raising fears that they may be more susceptible to attacks as hackers adapt…
language mattersclarified definitionsa physical analogthe exploitation anglepentests don’t include vasummary There are many views on what constitutes a Vulnerability Assessment versus a Penetration Test. The main distinction, however,…
There’s a lot of information and misinformation out there surrounding COVID-19, aka the Coronavirus. It dawned on me that writing risks is literally one of the fundamental skills…
Guram stresses that he is not ‘sponsored by Zoom’ 😊 First of all, nothing is bulletproof and anything can be hacked. We all make mistakes and learn from…
A survey conducted by fintech security provider Entersekt through YouGov has found that over a third of British consumers (34 percent) distrust digital communications from banks to such an extent…
KnowBe4’s new Phishing by Industry Benchmarking Report, published this week, reveals organisation’s Phish-Prone percentage (PPP), which indicates how many of their employees are likely to fall for a…