Verizon has recently released its comprehensive 2014 Data Breach Investigations Report, and its findings do not surprise me. But why should they? After all, it seems there isn’t a day that goes by without news of an attempted cyber attack or, worse, a successful data breach. Verizon’s report stresses that the variety and volume of […]
“100% of businesses are under attack; it is just that some don’t realise it.” Neelie Kroes, vice president of the European Commission (Digital Agenda) As our reliance on the internet grows and more devices become connected to the internet (the internet of things) the opportunities for cyber criminals also increase. Technology is often developed and […]
Know your vulnerabilities before cyber criminals discover them June and July saw a spike in cyber attacks on organisations of all sizes, including Domino’s Pizza, Code Spaces, the World Cup websites, StubHub, CNET and – perhaps ironically – the Get Safe Online website. We expect to see this continue in August as attackers leverage high […]
The recent spate of high-profile data breaches is having a surprisingly significant knock-on effect on the behavior of online shoppers, with 56% of those surveyed by USA Today saying they were now only shopping online with ‘large, well-known companies they were confident were safe’ and 24% admitting they’d stopped shopping online altogether out of fear.
Since suffering one of the biggest data breaches in retail history, Target has been struggling to recover its image. Sales in its US stores have decreased by 0.3%, driven by a falling number of transactions. As a result, Target is now cutting its prices in order to drive footfall to stores, even though it will affect profit margins further.
US senators met at the beginning of May 2014 to start pushing a bill that allows “companies to share information that could help prevent cybersecurity attacks”. The bill is being pushed by Senate Intelligence Committee Chairwoman Dianne Feinstein, who wants companies to monitor their own network to locate cybersecurity threats. This new bill would grant companies legal protection for sharing such information.
Believe it or not, a global organised crime gang has offered its associates a Ferrari for whoever comes up with the best cyber scam to lure in vulnerable victims. This unusual competition shows the lengths cyber crime gangs will go to recruit and retain young technological talent, and how much money is involved in this dark market.
The latest in its growing cybersecurity catalogue, this book discusses how organisations need to adopt a culture of cyber security awareness that complements their technology-based defences to rebuff the ever-increasing threat of cyberattack.
The Information Security Forum (ISF) has recently published their forward looking report on the security threats and cyber landscape of the future ‘Threat Horizon 2016 – on the edge of trust.’
This week a 19 year old Cambridge student, William Shackleton, took the much coveted title of UK Cyber Security Champion. The 12 month contest tasked the 41hand-picked finalists with protecting the UK critical infrastructure from cyber attack.