How does social engineering work in cyberattacks?

In terms of a cyberattack, social engineering is a collective word that covers many different types of malicious activities that are carried out through human interactions. This tactic is often employed by threat operators and involves the psychological manipulation of victims with the aim of fooling them into taking a specific action that will be […]

Read More… from How does social engineering work in cyberattacks?

Sir George Zambellas – a long journey in entrepreneurship

During September 2022, Sir George Zambellas, Chairman at Galaxkey Ltd, lectured at the Alex Brown Center for Entrepreneurship & Innovation at the University of Maryland in Baltimore County, USA, following the kind invitation of the faculty Director, Mr Kevin Fulmer, supported by Vivian Armor, the Program Manager. The Centre’s motto is that “Entrepreneurship is for […]

Read More… from Sir George Zambellas – a long journey in entrepreneurship

A word on resilience in innovation from Sir George Zambellas

On 15th September 2022, Sir George Zambellas, Chairman at Galaxkey Ltd, gave a thought-provoking speech. The subject was “Resilience in Innovation”.  His host was bwtech@UMBC Research and Technology Park, Maryland. To set the scene, UMBC Research and Technology Park harnesses the resources, research, and expertise of UMBC. It enables companies to start, grow, and stay […]

Read More… from A word on resilience in innovation from Sir George Zambellas

Cyberattack on Australia telecoms company exposes personal data

Optus, the second largest telecommunications company in Australia, with over 10 million subscribers on its database, recently reported it has been the victim of a cyberattack. The widescale data breach has resulted in the exposure of customers’ full names, phone numbers, email addresses and dates of birth, among other personally identifiable information (PII). While the […]

Read More… from Cyberattack on Australia telecoms company exposes personal data

Major US airline confirms data breach following email compromise

US aviation operator American Airlines recently notified its customers of a data breach, after malicious operators compromised an undisclosed number of email accounts belonging to its personnel and gained access to confidential personal information. However, in its dedicated breach notification letters, the airline stated that it had no evidence that the personal data exposed was […]

Read More… from Major US airline confirms data breach following email compromise

New York financial service giant faces $35 million charge for data breach

The United States Securities and Exchange Commission has now confirmed it will bring charges against financial services multinational Morgan Stanley Smith Barney (MSSB). The reason for the charges has been described by US regulators as being for its “astonishing” failure to safeguard the personally identifiable information (PII) belonging to approximately 15 million of the company’s […]

Read More… from New York financial service giant faces $35 million charge for data breach

Sir George Zambellas on The Digitisation of our Brains

On 15th September 2022, Sir George Zambellas lectured on “The Digitisation of our Brains” at the Live! Event Center in Hanover, Maryland, following an invitation from the Cybersecurity Association of Maryland (CAMI). CAMI is a state-wide, non-profit organization that views cybersecurity as a strategic issue, and serves Maryland’s cybersecurity ecosystem through advocacy, education and community […]

Read More… from Sir George Zambellas on The Digitisation of our Brains

Consequences of a company data breach

When sensitive enterprise information or files containing personal details of data like email addresses, full names or financial account numbers are compromised, the result is a data breach. Additionally, if information is deleted, altered or stolen, this can also constitute such an event. Breaches can be caused by a malicious attack, by negligence on the […]

Read More… from Consequences of a company data breach

Uber internal systems hacked by teenager

Uber recently suffered a critical cyberattack, with an 18-year-old hacker allegedly downloading vulnerability reports and displaying screenshots of the enterprise’s internal systems, slack server, and dedicated email dashboard online. The screenshots uploaded by the hacker appeared to reveal total access to many critical IT systems belonging to Uber, including the firm’s Windows domain and security […]

Read More… from Uber internal systems hacked by teenager

Common questions regarding email encryption

With the rise in cyberattacks and data breaches, cybersecurity measures are increasingly being adopted to secure areas where personally identifiable information (PII) may be vulnerable, such as email accounts and their messages. Along with security filters that intercept malicious messages, email encryption is now a commonly used option to enhance an enterprise’s defences. In this […]

Read More… from Common questions regarding email encryption

Password Protection 101: How to Keep Your Passwords Safe

Cyberattacks using compromised passwords are on the increase. No-one is immune to such attacks, as proved recently, when IT giant Cisco revealed they were hacked by a ransomware group that leveraged a compromised employee’s personal account. It was found that the Cisco employee’s credentials were compromised after an attacker gained control of his personal Gmail […]

Read More… from Password Protection 101: How to Keep Your Passwords Safe