With Barclays Bank recently publishing the figures of refunds it made to customers who fell victim to authorised push payment (APP) fraud, there have been calls for greater transparency and reform to the current (voluntary) reimbursement code. Authorised Push Payment (APP) Fraud APP refers to situations where consumers have used a bank transfer to pay…

Read More

After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…

Read More

President Biden’s administration in the U.S. has placed new sanctions on Russia over alleged cyberattacks affecting the U.S. and its allies. What Is Russia Accused Of? The U.S. government sanctions relate to: – The ‘SolarWinds attack’ where cyber-criminals accessed 18,000 government and private computer networks. The U.S. appears to blame the Cosy Bear hackers for…

Read More

The Ransomware Threat Report 2021 from Unit 42 shows that the average amount paid by ransomware victims tripled from 2019 to 2020. Ransomware Ransomware is a form of malware that encrypts the important files on a computer and the user (often a business/organisation) is given a ransom demand, the payment of which should mean that…

Read More

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different…

Read More

In this week’s article, which is the first of two parts on what is a huge subject for businesses to tackle, we take a look at some of the important issues of email security and how businesses can try to strengthen this crucial area of their cyber defences. Most Breaches Involve Email Over 90 per…

Read More

Microsoft is launching a new “campaign views” tool in Office 365 that is designed to offer greater protection from phishing attacks by enabling businesses to be able to spot the pattern of a phishing campaign over individual messages. Context and Visibility Microsoft is in a good position to leverage the large amount of anti-phishing, anti-spam,…

Read More

A website (and its supporting infrastructure) which sold a variety of hacking tools to other would-be cybercriminals has been closed down after an investigation by agencies from multiple countries including the UK’s National Crime Agency (NCA). IM-RAT The main tool that the agencies were particularly interested in eradicating was the Imminent Monitor Remote Access Trojan…

Read More

Ring Doorbell Tech Leaves Door Open To WiFi Password Hack Security analysts at Bitdefender have announced a major vulnerability with the Amazon-owned Ring doorbell technology platform. The flaw exposes the Ring doorbell by making the Wi-Fi password publicly available during setup. According to Tech Crunch: “Bitdefender said the Amazon-owned doorbell was sending owners’ Wi-Fi passwords in…

Read More