Security awareness training: Why it matters
Dr. Peter Lokhorst is Managing Director of InfoSecure BV, which is currently in seven countries and provides awareness training programs to international clients including …
Exploring the complexity of modern cyber attacks
James Holley is an Executive Director at Ernst & Young LLP. In this interview he discusses the complexity of modern cyber attacks, the challenges involved in maintaining …
Tips for handling your first security breach
When it comes to data breaches, the risk for organizations is higher than ever before – from the calculable costs of leaked data to the less tangible effects on the …
Effective incident response
Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical – but among those needles are little threads of …
Cyber risks awaiting visitors and viewers of Sochi 2014 Olympics
The 2014 Winter Olympics are set to start on Friday in Sochi, a Russian city located on the shores of the Black Sea. There have been many controversies regarding this choice …
Five lessons we can learn from financial services and compliance
Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …
A solution for fixing hijacked Chrome settings
Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …
How a fake antivirus attack works
Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …
Defending against drive-by downloads
In case you haven’t heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and …
Why governance and policy can strengthen compliance efforts
A colleague of mine recently made a joke and it made me pause to think. During our discussion on compliance and how internal policy can help organizations comply with external …
How to recover deleted or corrupted digital currency
The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …
Smartphone spying: How can users protect themselves?
Smartphone users need to realise that their mobile phone is less of a phone and more of a mobile computer, in which applications can collect data from other applications …
Featured news
Resources
Don't miss
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools