Cyber Crime

Cybercrime: Assume breach, never trust and always verify

For decades cybercriminals have used tactics such as phishing and malware, but the convergence of two pivotal technologies sparked a dramatic surge in cybercrime.

Africa’s Cybersecurity Problems Impact Us All

Africa leads the world in mobile banking and so it is no surprise that banks are one of the biggest targets for cybercriminals.

Securing your data in the cloud: All you need to know

David Blevosky, CEO of Cloudhelix, highlights how securing your data in the cloud is straightforward and can protect your business against any expense and reputation damage caused by cyber crime.

The importance of cybersecurity: Protecting against cyber-attacks

Thorsten Stremlau, Trusted Computing Group’s Marketing Work Group Co-Chair, highlights the importance of cybersecurity, as well as the risks of cyber-attacks and how best to protect against them.

Hacking back: The dangers of offensive cyber security

Morey Haber, Chief Technology Officer, Chief Information Security Officer, BeyondTrust highlights the dangers of hacking back against cyber criminals.

Are cybercriminals manipulating the UK general election?

Here, David Warburton discusses the potential for manipulating the UK general election in the digital age.

Keeping hackers out and costs low: Cyber security in the public sector

Kieran O’Driscoll, Public Sector Business Lead at CyberArk discusses the challenges faced by public sector firms when it comes to balancing cost-effective cyber security with the need to secure the personal details of millions of UK citizens.

The rise of cyber-stalking

Ernest Aduwa, Solicitor at specialist criminal defence and civil litigation firm Stokoe Partnership Solicitors, charts the rise of cyber-stalking.

The human factor in organisational cyber resilience

Here, Dr Sandra Bell discusses organisational cyber resilience and why the human factor is so crucial.

Vietnam: Man imprisoned for making facebook post

Internet censorship in Vietnam is a consistent fear exemplified in the case of Nguyen Ngoc Anh, a man imprisoned for creating a facebook post.

WhatsApp attacks: Pegasus spyware hacks 1400 users

WhatsApp have launched a legal case against the NSO group, for hacking the encrypted messaging platform with their Pegasus spyware which roughly impacted 1,400 users.

Pornhub: The ongoing revenge porn investigation

Recently, CPS begun a revenge porn investigation that delved into how and why these images are allowed to exist.

The Lancaster University data breach: Safeguarding students personal information

Organisations like universities that handle significant amounts of confidential and personal information are increasingly being targeted by cyber criminals. In this article SecureTeam looks at the damage data breaches are causing in UK universities.

Top five areas of focus for CISOs when it comes to the cloud and cybersecurity

Chief Information Security Officers (CISOs) have a key role to play in safeguarding the data increasingly stored in the cloud and mitigating cybersecurity threats, while also ensuring compliance with IT regulations, standards, and policies.

Why trust at face value can’t fix the civil service email leaks

Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.

The Secrets Behind Voice-Command Virtual Assistants

"10 Minutes, I'll Give You The Truth About Smart Speaker and Virtual Assistants". Marsali Hancock of the EP3 Foundation discusses.

Cybersecurity in hospitals and care centres

Dr Peter Leitner and Stela Shiroka, at INTERSPREAD GmbH, detail cybersecurity in hospitals and care centres and their thoughts on the need for increased awareness and enhanced training capabilities in Europe.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders