cybersecurity framework implementation
- Cyber Security
One in six people use pet’s name as password
Other common and easily hackable password choices include the names of relatives and sports teams, a UK study reveals As…
Read More » - Cyber Security
No, I Did Not Hack Your MS Exchange Server — Krebs on Security
New data suggests someone has compromised more than 21,000 Microsoft Exchange Server email systems worldwide and infected them with malware…
Read More » - Cyber Security
Week in security with Tony Anscombe
A banking trojan masquerades as Clubhouse for Android – The implications of the Verkada breach – A zero-day patched in…
Read More » - Cyber Security
WhatsApp may soon roll out encrypted chat backups
While chats are end-to-end encrypted, their backups are not – this may change soon WhatsApp is said to be working…
Read More » - Cyber Security
Women in cybersecurity: Gender gap narrows but not enough
The number of women joining the ranks of cybersecurity practitioners is steadily increasing, but a lot still needs to be…
Read More » - Cyber Security
ESET Threat Report Q4 2020
A view of the Q4 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…
Read More » - Cyber Security
21 arrested after allegedly using stolen logins to commit fraud
UK police also give some food for thought to those on the verge of breaking the law The long arm…
Read More » - Cyber Security
Week in security with Tony Anscombe
Law enforcement disrupts Emotet – Wormable Android malware spreading via WhatsApp – Three iOS zero-day bugs squashed An international law…
Read More » - Cyber Security
What’s your attitude to parental controls?
Nobody said parenting was easy, but in the digital age it comes with a whole slew of new challenges. How…
Read More » - Cyber Security
Week in security with Tony Anscombe
ESET research analyzes the Vadokrist banking trojan – Beware smishing scams – WhatsApp postpones privacy policy changes ESET researchers released…
Read More »