Although there is no legal guideline, the consensus is that our children don’t really need smart phones, not until they are at least twelve, possibly fourteen, or at least, that's what Bill Gates was saying in 2017.
Recent attacks on: Bycycklen, (Copenhagen's public city bikes system); the discovered vulnerabilities in Cardiac devices and plenty of other frightening DDoS attacks expose the precarious and costly state of affairs in IoT security.
With the conversion of 90% of in-store terminals from swipe card tools to EMV chip technology, the gateway to ever increasing mobile payments has swung wide open. So, has the entrance to more virtual security problems at the point of sale.
Being a cautious group by nature, Cyber security enthusiasts always approach new digital currencies with caution. Forget the hype and the criminal element that places Bitcoin and the blockchain at the center of many an international drug scandal and on the SEC hitlist, the safety and security of everyday trading is troubling to cyber security enthusiasts.
Google Chrome has been hit by a group of scammers, trying to intimidate users into paying for fake Tech Support. Under the guise of providing assistance from a desktop cyber penetration, these sneaky hackers are worming their way into systems worldwide. Users, naturally more worried than suspicious by nature and prompted by an unhealthy dose of fear, give access to their details or pay for 'tech support'.
As if advertising wasn't intrusive enough, 'Malvertising' the malicious form of online advertising, used to spread malware, is on the rise.
Marketeers, Public Relation Experts and Advertisers will be nervously shuffling their feet for a bit, whilst the Cyber Security professionals get to work on a new and potentially huge threat, Vega Stealer.
Recently uncovered by Proofpoint, Vega Stealer is the new sparkly malware found to be targeting the Retail, Manufacturing, Public relations and Advertising sectors.
When we discuss the way that cyber criminals access your computer, the following spring to mind: DDos attacks; phishing; Firewall vulnerabilities; SQL injections. One form of attack that doesn't get so much hype but is just as dangerous as any other, is Clickjacking.
Twitter has urged all its users to change their passwords due to a malfunction in their 'hashing' system which recently exposed all their users' passwords.
The 'Hashing System' is Twitters encryption process for passwords and provides some level of everyday security for Twitters users, outside of serious vindictive hacking on users' accounts.
Cyber Security experts who have been chanting at us that we need to focus on our strongest (and in terms of Cyber Security, weakest) resource, our users, for years, have started laying the foundations for another route to Cyber safety, which doesn’t rely on manpower.