Real-life hacking can be slow, tedious work that that often returns little financial gain Michael Hill There is a part of me that finds hackers, or cyber-criminals, of fascinating interest.…
Month: February 2016
Cyber Resilience Capabilities Often in Ad-Hoc Plans
43% say that they have nothing in place, and 20-25% have an ad-hoc unprepared plan. Dan Raywood Only 29% of UK organizations would rate their cyber-resilience as high, and 43% of companies…
Flaws in smart toy back-end servers puts kids and their families at risk
The vulnerabilities would have given attackers access to children’s names, birth dates, gender and even location. By Lucian Constantin Over the past two years security researchers have shown that many…
Date site users regularly scammed
Almost half of the people who use dating sites and apps have been scammed or spammed, suggests research. By Mark Ward, Technology correspondent Carried out by security firm Symantec, the…
WordPress under attack by whack-a-mole ad-scam malware
JavaScript attack spreads among sites, re-infects after cleansing. Darren Pauli Sucuri threat researcher Denis Sinegubko says a “massive” advertising scam campaign is affecting users visiting WordPress sites, injecting backdoors and…