Businesses, and anyone caught in a bad-tempered divorce, should be on the alert for mercenary hackers for hire. Firms large and small have been victim to keypad for hire gunslingers who possess tech savvy skills to breach the most sophisticated defences.
Israel has accused Hamas – a Palestinian Islamist group – of using a World Cup live scores and fixtures app and two fake dating apps to hack soldier’s smartphones and spying on them. Who can be safe from cyber-criminals and hacking?
Many have labelled the rise of Artificial Intelligence (AI) as a new type of industrial revolution. AI has the potential to improve productivity across a range of sectors, whilst lowering costs. However, there are risks of AI, similar to any technology that is not adequately managed or secured. The criminal network has been improving this capability for years through the use of botnets, and AI brings with it a new range of cyber security risks.
Phishing has become one of the most talked about threats in cyber security and…
Phishing Protection: Get enterprise-class reliability and protect against phishing, spoof, spam and malware, while maintaining access to email during and after emergencies. Exchange Online Protection provides a layer of protection features that are deployed across a global network of datacenters, helping you simplify the administration of your messaging environments. A cloud-based email filtering service that helps protect your organisation with extensive use of machine learning to detect risky attachments and web-links; phishing, scam and fake emails are discovered and destroyed before they even reach your inbox.
The exploit affects Windows, iOS and Android. Spear phishing campaigns with the attachments are groundwork for future attacks.
Cyber security is now a pressing issue for many organisations. If you’re unaccustomed to the technology sector, it can be hard to decode the extensive volume of technical language. As part of the research project I am currently involved, cyber security concerns within UK businesses is a key area. Read more as I attempt to break down the complicated language surrounding the topic in a Glossary of terms.
Attackers behind today’s WannaCry ransomware outbreak in Europe are spreading the malware using the EternalBlue exploit leaked by the ShadowBrokers. Source: Malware Leaked NSA Exploit Spreading Ransomware Worldwide
It’s not at all a surprise that Google Mail users have today been hit by a massive Phishing attack. Given the rise of exploits being sourced using Google platform services, such as the GOOGLE RECAPTCHA BYPASS and the malware CARBANAK USING GOOGLE SERVICES it was inevitable.
Office 365 anti-spoof email protection: Insider spoofing or faking the email address of the CEO or the Managing Director to trick the CFO or the Finance Director into transferring tens of thousands of Pounds to criminal bank accounts is really big business. Microsoft, with Office 365 anti-spoof email protection, is quashing the threat.