Cyber Threats

The digital revolution has made techies of millions of people around the world, hooked up and logged on to an overarching superstructure practically all the time. For all the benefits it has brought, it has come with costs and few have more profound consequences than the growing risk of serious cyberattacks. Everything from critical infrastructure, such as […]

by

CHEVY CHASE, Md., Feb. 15, 2018 /PRNewswire/ — Cybersecurity leaders from Asia, Europe, the Middle East and the U.S., including the Department of Defense, the National Security Agency and the Department of Homeland Security, are on the agenda for a one-day deep dive into global threat assessment and solutions at the 3rd Annual Billington International Cybersecurity Summit March 21, Washington, D.C. Billington […]

by

This week, it was revealed that over 4,000 websites, including the NHS, the US government’s court system, Manchester.gov.uk, the Student Loans Company and the Financial Ombudsman Service have all been hijacked by hackers who use them to secretly mine cryptocurrencies. Hackers exploit a very common plugin, called Browsealoud, which is used by these sites. Then, when visitors […]

by

What do Anthem, Yahoo, LinkedIn and JP Morgan Chase have in common? If you guessed that they were all victims of some of the world’s largest data breaches, you’d be correct. From insurance carriers to retailers, financial institutions to the U.S. military, all organizations that have an online presence are subject to cyber-related risks and […]

by

What do Anthem, Yahoo, LinkedIn and JP Morgan Chase have in common? If you guessed that they were all victims of some of the world’s largest data breaches, you’d be correct. From insurance carriers to retailers, financial institutions to the U.S. military, all organizations that have an online presence are subject to cyber-related risks and […]

by

Nick Ismail The biggest change to data protection laws since the 1990s, GDPR requires businesses to put “appropriate measures” in place to protect the Personally Identifiable Information (PII) it holds, whether that’s customers, prospects, employees or suppliers. All businesses will hold some form of PII, even if it’s just employee data, and therefore must comply […]

by

As the techniques around maintaining a safe level of cybersecurity continue to evolve both publicly and privately, a group of University of Nevada, Reno professors along with the University’s chief information security officer are working on creating an active approach to a cybersecurity mindset that they believe has become too passive. Associate professor Shamik Sengupta, […]

by