Silence is golden By James Billington Hackers could be looking to steal your voice and use it to carry out online theft after researchers discovered voice-based user authentication systems are…
Day: September 29, 2015
10 Password Managers For Business Use
Beyond helping end users keep track of their logins, some password managers can integrate with Active Directory and generate compliance reports. Sara Peters Password manager software makes promises that many…
Mobile advertising DDoS JavaScript drip serves site with 4.5bn hits
Once-theoretical attack vector appears fully-formed on CloudFlare’s doorstep. Darren Pauli CloudFlare has turned up an unusual form of denial-of-service attack: mobile advertisements that are pumping out around 275,000 HTTP requests…
Medical devices vulnerable to hackers
Shock that devices can be found online by hackers. Thousands of critical medical systems, such as MRI machines, are available for hackers to access online, according to researchers. Some 68,000…
respondents were targeted by phishing scams.
Over half of respondents were targeted by phishing scams. The true scale of cybercrime has been revealed by the most in-depth survey of its kind ever undertaken in Warwickshire. Losses…
factoring in information security into business strategies.
Too few firms factoring in information security into business strategies. by Sara Bean: Ashley Madison and Sony are the high profile victims of cyber-hacking, but with hacks becoming more prevalent, nearly…