Understanding encryption and GDPR
The General Data Protection Regulation’s (GDPR) security principles demand that firms use appropriate organisational and technical measures to ensure personal data is processed safely. In…
The General Data Protection Regulation’s (GDPR) security principles demand that firms use appropriate organisational and technical measures to ensure personal data is processed safely. In…
16/11/21: Galaxkey, the cybersecurity platform known for its innovative approach to protecting sensitive data simply and effectively, has won funding to develop a platform that…
Britain’s largest online fishing supply shop, Angling Direct, was recently hacked by malicious operators with keen anglers using the ecommerce platform finding themselves redirected to…
Emails and the account they are sent from contain a wealth of sensitive data. If a hacker obtains access to them, the result can be…
Cybersecurity experts at Palo Alto Networks recently issued warnings about an insidious hacking campaign. The continuing cybercriminal initiative has already compromised at least nine different…
The term “botnet” defines a collection of internet-connected technological devices that are enslaved and injected with malware, designed to give control of some or all…
Malicious software, or malware for short, is used by cybercriminals in a wide variety of campaigns and strategies involving extortion and data theft, among other…
Cybersecurity researchers have observed two different campaigns linked to SolarMarker backdoor or the nefarious ransomware gang, REvil, that utilises search engine optimisation (SEO) poisoning to…
A newly detected Android malware is able to root infected tech to take total control, while tweaking system settings unnoticed. The malware is also able…
Around 400,000 German student records were recently exposed due to a flaw in an application programming interface (API).