Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
BLACK TECH FEST REAFFIRMS COMPANIES COMMITMENT TO BRITISH BLACK COMMUNITY
StartUps Magazine
Response to a phishing attack: persuasion and protection motivation in an organizational context
This study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an organizational context. In a simulated field trial conducted in a financial institute, via PhishMe,...
Essential awareness of social engineering attacks for digital security
This study is an attempt to check the level of awareness of social engineering attacks among professionals who are working online. A survey of employees, who are working in Delhi NCR in different organizations and industries, was conducted. The results of the survey...
Pause for a cyber security cause: Assessing the influence of a waiting period on user habituation in mitigation of phishing attacks
This study designed, developed, and empirically tested a Pause and Think (PAT) mobile app that presented a user with a warning dialog and either a countdown or count-up timer whenever an email with a link was opened. The user was not able to interact with the email...
CatBERT: Context-aware tiny BERT for detecting targeted social engineering emails
Targeted phishing emails are a major cyber threat on the Internet today and are insufficiently addressed by current defences. In this paper, we leverage industrial-scale datasets from Sophos cloud email security service, which defends tens of millions of customer...
A survey study evaluating Internet users’ proneness to fall prey to social engineering attacks
This research evaluated the Internet users' proneness to fall prey to five most common types of social engineering attacks which are domain spoofing, email spoofing, search engine phishing, SMS phishing, and social media phishing. 350 volunteer participants...
Social research methods in cyber security: From criminology to industrial cyber security
The application of social research methods in cyber security requires a multidisciplinary combination since the security of technologies and communication networks is made up of a set of uses, techniques, and results directly conditioned by the parameters of...
Cyber security awareness and behaviour of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam
This study focuses on comparing the level of cyber security awareness, knowledge and behaviour among university students in general and between Hungary and Vietnam in particular. Research data was collected, using a set of questionnaires and the 313 responses from...
Cognition, behavior and cyber security
Cybersecurity appears to be the ultimate paradox: while cybersecurity budgets are increased every year, and a vast array of new security products and services appear in the market, cyber attacks have been increasing in scale and scope every year. 2020 will perhaps be...
Personal data breaches drop 20%, says Information Commissioner
Digit
Isle of Wight schools hit by ransomware
Computing
Six Isle of Wight schools hit by ransomware attack
Computer Weekly
A study about the role of the human factor in maritime cyber security
Shipping is the sector of the economy via which approximately 85% of all world trade is transported and which is technologically developing with enormous leaps. Its digital transformation has highlighted new opportunities, but at the same time new threats. Due to the...
The unprecedented rise in cyber crime and the role of the human vulnerability factor
This chapter will discuss the important topic of ethical hacking, also known as penetration testing. It will start by explaining the constituents of ethical hacking: scope and goal setting, exploitation, and documentation. The...
Remote working and in(security): The impact of pandemic-driven remote working on employee wellbeing, the psychological contract and cyber security
Remote working during the COVID-19 pandemic has had, and continues to have, a great impact on the workforce. Through interviews with senior cyber security professionals, this research explored how the traditional dynamics between employees and leadership have adapted...
Cyber security in the age of COVID-19: A timeline and analysis of cyber crime and cyber attacks during the pandemic
This paper analyses the COVID-19 pandemic from a cyber crime perspective and highlights the range of cyber attacks experienced globally during the pandemic. Cyber attacks are analysed and considered within the context of key global events to reveal the modus-operandi...
Evaluation of information security awareness among Palestinian learners
This research aims to assess the level of Internet users’ security awareness among Palestinian learners. The study focuses on five fundamental security issues involving passwords, social media usage, email usage, security of mobile devices, and social engineering. A...
Humans in the loop: Cyber security aspects in the consumer IoT context
Currently, the consumer electronics (CE) community largely ignore the humans in the loop, while framing cyber security solutions in the IoT context. In this work, we stress on the need towards a human-centric approach to cyber security by shifting focus from "humans...
When it comes to addressing burnout, it needs to start from the top
Business Express
Augmented reality and the digital twin: State-of-the-art and perspectives for cyber security
The rapid advancements of technology related to the Internet of Things and Cyber-Physical Systems mark an ongoing industrial revolution. Digital Twins and Augmented Reality play a significant role in this technological advancement. They are highly complementary...
Remote working pre- and post-COVID-19: an analysis of new threats and risks to security and privacy
In this article, we critically analyse cyber security and privacy concerns arising due to remote working during the coronavirus pandemic. Through our work, we discover a series of security risks emerging because of the realities...