Security
New Phishing Tracker For Office 365
Microsoft is launching a new “campaign views” tool in Office 365 that is designed to offer greater protection from phishing attacks by enabling businesses to be able to spot the pattern of a phishing campaign over individual messages. Context and Visibility Microsoft is in a good position to leverage the large amount of anti-phishing, anti-spam,…
Read MoreReal-time Phishing Protection Now Available in Chrome
Google has announced real-time phishing protection with the help of improvements to ‘Safe Browsing’ which allow Chrome to check each new site you visit against a safe list stored on your computer and with Google so that Chrome can issue an instant warning if the site is thought to be suspicious or malicious. Phishing Problem…
Read MoreHow Does Encryption Work?
Encryption comes from the age-old science of cryptography. In the digital world of today, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble messages and data, making them unintelligible to anyone who tries to intercept them, and also to provide an effective way to lock our electronic devices. Using Encryption…
Read MoreThe Tech That The Parties Are Promising
With the UK’s General Election due to take place on 12 December, many issues have been covered in the media. One key area of interest for businesses is technology and for those of you who may not have time to plough through the manifestos of the main parties, here’s a quick look at some of…
Read MoreGoogle Or Samsung Android Cameras Could Be Spying On You
Researchers at Checkmarx say they have discovered vulnerabilities in Google and Samsung smartphone apps that could allow hackers to remotely spy on users using their phone’s camera and speakers. Study The proof-of-concept (PoC) study results, highlighted on the Checkmarx blog reveal how the Checkmarx Security Research Team cracked into the apps that control android phone…
Read MoreResearch Says Memes Can Tell Between Humans and Bots
Researchers from the University of Delaware have concluded that when it comes to authentication for logins, Memes may be one of the strongest techniques to distinguish between a human and a bot. The Bot Challenge One of the great challenges to websites when it comes to authentication for logins is that software bots can fool…
Read MoreResearchers Warn That Intel Chips Are Still Vulnerable
The New York Times has reported that despite Intel issuing patches for security flaws (that were discovered last year) in its processors, security researchers are alleging that the processors still have some serious vulnerabilities. What Flaws? In January 2018, it was discovered that nearly all computer processors made in the last 20 years contained two…
Read MoreScale of Police Computer Misuse Uncovered
A Freedom of Information (FoI) request made by think tank Parliament Street has revealed that 237 serving officers and members of staff have been disciplined for computer misuse in the last two financial years. Sackings and Resignations The FOI request, which was responded to by 23 forces also revealed that 6 employees resigned and 11…
Read MoreSecurity Updates 17th October 2019
The latest news finds the Cookie ‘Monster’ attacking Sesame Street’s Online Webstore, FIFA 20 has had a major user data breach, spoofing emails are becoming more and more elaborate and costing companies millions, and more … Cookie Monster Malware Attacks Sesame Street Online Store Thousands of online retailers – including Sesame Street’s online webstore –…
Read More