Hacking

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.

Does your organisation need a CISO?

How rising data security fears have boosted the role of the Chief Information Security Officer

Security alert: Hackers shift focus from ransomware to cryptojacking

Hackers have been increasingly moving towards cryptojacking attackshijacking computing resources and using that to mine cryptocurrency.

Wickr, Linux, Twilio sign open letter against Australia's encryption crackdown ‘mistake’

​Prime Minister Malcolm Turnbull’s favourite secure messaging app Wickr is among the 76 organisations and individuals that have signed an open letter today calling on his government to reject its plans to ‘undermine strong encryption’.

How to tell if your computer has been hacked

Although most of us have some form of anti-malware software installed, this cannot always offer peace of mind in regards to attacks on our networks, given that cyber attacks are constantly evolving.

Partner Content
Is Your Data Hackproof?

Two Canadian banks, The Bank of Montreal and CIBC-owned Simplii Financial, were targeted by hackers who managed to get access to the personal information of thousands of their customers. 

The top 3 disruptive FinTech technologies to watch in 2018

FinTech will benefit from three technologies that are expected to expand the usefulness of big data, offer more secure and responsive applications and exponentially grow computational performance.

Archaic practices, skills shortage biggest gaps in security today: Rajnish Gupta, RSA

Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.

Top six security and risk management trends: Gartner

Analysts will explore the trends security leaders face during the Gartner Security & Risk Management Summit, September 10-11, 2018, London, U.K.

Rising threat: Children’s identities being sold on the dark web

Michael Connory’s firm Security in Depth develops cyber security awareness programs for corporate organisations. This training involves discovering what information about company executives resides on the ‘dark web'. But these searches often uncover something more sinister.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.