Wednesday, October 27, 2021
NTT Security

Manufacturers Beware

The demand for cybersecurity will certainly rise as a new report by NTT Security sheds some light into growth in cyber threats. NTT Security’s Global Threat Intelligence Center (GTIC) released their...
neutrality

Congress Members Suggest FCC Danger Zone with Net Neutrality

Net neutrality is the byword of the month, with a series of important suggestions and announcements in recent weeks. The debate over whether the US government will continue to allow the...

Trump, Russia, and the Escalating Risks of Cyber Arms Race

Max Smart, the 60’s spy comedy hero, had a phone in his shoe and a camera to take photos of sensitive documents in a pen. While those technological advances have since...
SVR tracking

What Stephen King’s “It” Can Teach Us About Cyber Breaches

Everyone has a different tolerance level for scary movies. The strong of heart all flocked to the theater this past weekend to see Stephen King’s “It”, which made 117.2 million dollars...
Car Jacking

The Hooligans: High Tech Car Jacking

In the summer of 2014 an investigation arose after dozens of Jeep Wranglers were victims of car jacking, seemingly right from under their owner’s nose, with no traces of evidence left...
phishing attacks

Google Fights Back on Phishing

There’s an old American adage - “never bring a knife to a gun fight.”  Google proved this to be radically true after the substantial phishing attacks that cause so much damage...
Phishing

Phishing for the Big One

Phishing has usually been consigned to Nigerian princes and retirees who had no idea about technology. Those duped by these scams have traditionally been the laughing stock of the tech world,...

UK winning cybersecurity battle, claims DCMS

The proportion of UK businesses experiencing cyber breaches or attacks has dropped from 43 percent to 32 percent in the past 12 months, according to an announcement from the Department for...
Endpoint Devices

Endpoint Devices: Automated Mitigation can be Tricky

Security incidents, attempted breaches and similar problems are a risk that every company has to deal with. Most companies have introduced automated systems that can detect, investigate, and prevent such problems...
computer scan medical technology

Ageing populations demand new technologies, says government

In 2014, the median age of the UK population passed 40 for the first time. Over the next 20 years, the number of citizens aged over 60 will increase from just...

LATEST NEWS

MUST READ