The Covid-19 pandemic, shifts in the global economy and the Ukraine conflict have further strained an already imperfect global supply chain. Based on a recent ISACA survey of more than 1,300 IT... Read more »
Donning a navy T-shirt and smiling at the camera, Daniel Kelley looks every bit a typical young person. But he’s actually one of Britain’s most prolific cyber criminals, having served four years... Read more »
The business-enabling category of privacy-enhancing technologies (PETs) is making its mark as the one of the foundational technologies of the digital transformation era. With data as the backbone of the digital economy,... Read more »
A dedicated cyber security research cluster has officially opened at the University of Abertay in Dundee with the objective of supporting Scotland’s rapidly growing cyber sector. The first such cluster to open... Read more »
A team of Proofpoint researchers say they have discovered potentially dangerous standard functionality in Microsoft Office 365 that could allow ransomware to encrypt files stored in SharePoint and OneDrive in such a... Read more »
It’s old news that the pandemic has accelerated the adoption of digital means, but perhaps not widely recognised or accepted yet is that this will change the security paradigm in the short... Read more »
Some 2,000 cyber crime operatives, fraudsters and money launderers have been arrested, with 4,000 bank accounts frozen and $50m (£41.5m) of illicit funds seized in a two-month, worldwide operation against cyber fraud,... Read more »
In 2020, following the publication of its digital identity whitepaper, TechUK called for industry and government to fully recognise that, to ensure our economic future, the UK must establish a truly digital... Read more »
The average cost to access the network or IT systems of an organisation lies somewhere between $2,000 (£1,650) and $4,000 (£3,300) – a relative trifle when compared to the sums ransomware operators... Read more »
What is directory traversal? Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory other than the... Read more »