Israel has accused Hamas – a Palestinian Islamist group – of using a World Cup live scores and fixtures app and two fake dating apps to hack soldier’s smartphones and spying on them. Who can be safe from cyber-criminals and hacking?
Is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons.
Many have labelled the rise of Artificial Intelligence (AI) as a new type of industrial revolution. AI has the potential to improve productivity across a range of sectors, whilst lowering costs. However, there are risks of AI, similar to any technology that is not adequately managed or secured. The criminal network has been improving this capability for years through the use of botnets, and AI brings with it a new range of cyber security risks.
Phishing has become one of the most talked about threats in cyber security and…
Phishing Protection: Get enterprise-class reliability and protect against phishing, spoof, spam and malware, while maintaining access to email during and after emergencies. Exchange Online Protection provides a layer of protection features that are deployed across a global network of datacenters, helping you simplify the administration of your messaging environments. A cloud-based email filtering service that helps protect your organisation with extensive use of machine learning to detect risky attachments and web-links; phishing, scam and fake emails are discovered and destroyed before they even reach your inbox.
The exploit affects Windows, iOS and Android. Spear phishing campaigns with the attachments are groundwork for future attacks.
Cyber security is now a pressing issue for many organisations. If you’re unaccustomed to the technology sector, it can be hard to decode the extensive volume of technical language. As part of the research project I am currently involved, cyber security concerns within UK businesses is a key area. Read more as I attempt to break down the complicated language surrounding the topic in a Glossary of terms.
Attackers behind today’s WannaCry ransomware outbreak in Europe are spreading the malware using the EternalBlue exploit leaked by the ShadowBrokers. Source: Malware Leaked NSA Exploit Spreading Ransomware Worldwide