Ethical hackers play a key role in keeping a company secure.
Kaspersky Lab researchers have examined publicly available hardware and software tools for covert password interception and discovered that a hacking tool can be created for as...
With consumers required to divulge personal details to access many apps, ensuring the safety of data has become a collective responsibility. NEIL COSSER, Identity and Data...
According to F5 data that tracks the 25 largest security breaches between 2000 and 2015, an astounding 72 percent of today’s attacks target identities and applications,...
Check Point researchers have discovered a new attack vector that could allow hackers to create malicious subtitles to target users of popular media platforms to gain...
As a small business owner, the last thing you need is an online security breach. That’s why it’s well worth getting the right security measures in...
Ransomware is on the increase, and while most threats request money in return for encrypted files, hackers are using other ways to extract payment from their...
Following the recent data breach in South Africa, HEINO GEVERS, Customer Experience Director at Mimecast, has outlined three tips for creating an effective cybercrime training initiative...
Check Point researchers recently spotted a flaw in one of Android’s security mechanisms. This flaw exposes Android users to several types of attacks, including ransomware, banking...
Research has revealed that cyberattacks on the government has sector doubled in 2016, hiking to 14% from 7% of all cyber security attacks in 2015. The...