New findings reveal the concerns of leading security researchers on non-malware attacks

New research released today from Carbon Black shows the concerns of cybersecurity. Findings show that nearly two thirds (64%) of security researchers said they’ve seen an increase in non-malware attacks since the beginning of 2016. Carbon Black, the leader in next-generation endpoint security has launched its latest research Beyond the Hype, into the cybersecurity landscape. […]

Ex cyber security chief says Government are using Westminster attack to gain more unnecessary spying powers

The Ministry of Defence’s former cyber security chief has stated that he believes the Government are using the Westminster attack to obtain intrusive surveillance powers which are unnecessary. Major General Jonathan Shaw explained that ministers were using the attack to push for security services to have more control, even though there is a weak case […]

Cyber threats and attacks: You can’t protect what you don’t know you have

Software Asset Management, or SAM, includes the management and optimisation of software within an organisation. It involves monitoring applications right from purchase, through to deployment, and then removal whilst tracking usage and maintenance. Part of the broader IT Asset Management (ITAM) discipline, SAM data underpins business decisions by assisting all departments with payment structures, contract […]

Experts warn of the continuing rise of ransomware attacks on internet-connected gadgets

New research this week by National Crime Agency and National Cyber Security Centre revealed that a particular kind of security breach, ransomware, has grown significantly over the past year, with the popularity of internet-connected gadgets increasing the risk of attacks for consumers. The report stated that more devices connecting to the internet means that criminals have […]

The Ugly Reality of Ransomware for SMEs

This malicious software will kidnap your data, hold a gun to its head and say: your move. Some attacks go even further and plant incriminating evidence on your computer to prevent the authorities getting involved. Ransomware exists in numerous forms and its methods are constantly evolving. Attackers employ this software to obtain leverage over you […]

The rise of the connected car and cyber security measures to ensure consumer safety

Ten years ago in-car connectivity was almost non-existent. However, with advances in technology developing at an almost supersonic rate, the proliferation of connectivity in the automobile manufacturing process is set to increase dramatically. By current estimation it is thought that at the very least 75% of new cars will feature some form of connectivity by […]