Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Some cyberpsychology techniques to distinguish humans and bots for authentication
.In a world where artificial intelligence is one of the greatest assets, unmanned operations seem to be the future. The world of cybersecurity is witness to numerous system break-ins for the purpose of gaining access. One of the ways to gain access to systems is...
WHAT IS LEVEL39? AND HOW IS IT REVOLUTIONISING THE LONDON TECH SCENE?
Business Leader
WHAT IS LEVEL39?
Business Leader
Meet the innovators
South West Business Insider
Security Excellence Awards shortlist recognises success
Computing
Identification and prevention of social engineering attacks on an enterprise
In recent times, the integration of technology in everyday tasks helps in making most of the cumbersome work more convenient. This integration has brought about a positive wave in aiding and assisting humans in various sectors such as the military, health, education,...
Breach of Ecuador citizens’ personal data holds key privacy lessons for enterprises
Computer Weekly Magazine
Over 40 per cent of SMEs have been attacked
Channel Info
One Quarter Of Surveyed UK Businesses Suffered From Cryptojacking, Security Firm Says
Crypto Briefing
A longitudinal analysis of the privacy paradox
The privacy paradox states that people’s concerns about online privacy are unrelated to their online sharing of personal information. Using a representative sample of the German population, which includes 1403 respondents who were interviewed at three waves separated...
A quarter of UK businesses have been cryptojacked, reveals new research
Malta Winds
Un cuarto de las empresas londinenses han sido víctimas del cryptojacking
Morocotacoin
A quarter of UK businesses have been cryptojacked, reveals new research
London, 17 September – Cryptojacking has already affected large numbers of UK businesses, according to new research from CybSafe, the cyber security awareness and data analytics company. In CybSafe’s survey of 250 IT decision-makers at UK small and medium-sized...
Password advice shouldn’t be boring: Visualizing password guessing attacks
Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance of text-based password advice, it appears insufficient to help home users create strong memorable passwords. We propose that users would be empowered to make...
CybSafe research: cryptojacking is increasingly popular
Cryptonomist
Ecuador citizens’ data breach holds lessons for enterprises
Computer Weekly
Research on industrial Internet of Things security architecture and protection strategy
Industrial Internet of Things (IIoT) is a fusion of industrial automation systems and IoT systems. It features comprehensive sensing, interconnected transmission, intelligent processing, self-organization and self-maintenance. Its applications span intelligent...
2 in 5 UK SMEs have experienced impersonation phishing attacks in the past year
Whitehall Media
Implementation of machine learning and data mining to improve cyber security and limit vulnerabilities to cyber attacks
One of the significant challenges in the realm of cyber attack detection is the scarcity of training data, which remains a formidable obstacle. Despite the utilization of established network monitoring tools like Wireshark, a vast number of individuals are still at...
#privacy: Almost half of UK SMEs targeted by phishing attacks
GDPR Report
A look into the frequency and success of phishing attacks on SMEs
Help Net Security