Cryptojacking

Featured Article – Email Security (Part 2)

Posted · Add Comment

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different […]

glimpsepfthe

Glimpse of the Future of Tech at CES Expo Show

Posted · Add Comment

This week, at the giant CES expo in Las Vegas, the latest technology from around the world is on display, and here are just a few of the glimpses into the future that are being demonstrated there, with regards to business-tech. Cyberlink FaceMe® Leading facial recognition company Cyberlink will be demonstrating the power of its […]

featured-article-photo

Featured Article – Email Security (Part 1)

Posted · Add Comment

In this week’s article, which is the first of two parts on what is a huge subject for businesses to tackle, we take a look at some of the important issues of email security and how businesses can try to strengthen this crucial area of their cyber defences. Most Breaches Involve Email Over 90 per […]

article1-campaign-views

New Phishing Tracker For Office 365

Posted · Add Comment

Microsoft is launching a new “campaign views” tool in Office 365 that is designed to offer greater protection from phishing attacks by enabling businesses to be able to spot the pattern of a phishing campaign over individual messages. Context and Visibility Microsoft is in a good position to leverage the large amount of anti-phishing, anti-spam, […]

encryption

How Does Encryption Work?

Posted · Add Comment

Encryption comes from the age-old science of cryptography.  In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption […]

The Tech That The Parties Are Promising

Posted · Add Comment

With the UK’s General Election due to take place on 12 December, many issues have been covered in the media.  One key area of interest for businesses is technology and for those of you who may not have time to plough through the manifestos of the main parties, here’s a quick look at some of […]

googleorsamsung

Google Or Samsung Android Cameras Could Be Spying On You

Posted · Add Comment

Researchers at Checkmarx say they have discovered vulnerabilities in Google and Samsung smartphone apps that could allow hackers to remotely spy on users using their phone’s camera and speakers. Study The proof-of-concept (PoC) study results, highlighted on the Checkmarx blog reveal how the Checkmarx Security Research Team cracked into the apps that control android phone […]

security-memes

Research Says Memes Can Tell Between Humans and Bots

Posted · Add Comment

Researchers from the University of Delaware have concluded that when it comes to authentication for logins, Memes may be one of the strongest techniques to distinguish between a human and a bot. The Bot Challenge One of the great challenges to websites when it comes to authentication for logins is that software bots can fool […]

intel-chips

Researchers Warn That Intel Chips Are Still Vulnerable

Posted · Add Comment

The New York Times has reported that despite Intel issuing patches for security flaws (that were discovered last year) in its processors, security researchers are alleging that the processors still have some serious vulnerabilities. What Flaws? In January 2018, it was discovered that nearly all computer processors made in the last 20 years contained two […]