Cyber-criminals have stolen a whole bunch of personal and patient data in a record-breaking hack which contained data between June to July 2018. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals and other healthcare institutions. More than 1 Million patient’s personal records have...Continue Reading
It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb...Continue Reading
As the years passed by, the rate of identity fraud and cyber fraud around UK rapidly increased causing to reach its highest record level this year. Researchers identified over 300,000 cases of fraudulent conduct recorded to the National Fraud Database in 2017, with data drawn from 306 organizations, including many major UK brands.Although these incidents...Continue Reading
Oxford, U.K. – Nov. 14, 2018 – Sophos (LSE: SOPH) today propelled its 2019 Threat Report giving bits of knowledge into developing and evolving cybersecurity trends. The report, delivered by SophosLabs researchers, investigates changes in the risk scene in the course of recent months, revealing patterns and how they are relied upon to affect cybersecurity in 2019. “The threat landscape is undoubtedly...Continue Reading
The seriously threatening part about data intrusion and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...Continue Reading
Why account credentials? Account credentials are basically the email/username and password of a user for their own personally or business use. But what if these information gets exposed online? To criminals account credentials are important and they consider it as an essential in their threat structure. Ever since breaches of database has been making the...Continue Reading
A new kind of Voice Phishing is circulating – the ‘can you hear me?’ phone scam has been reported in US, UK, and Australia. This is a little different to the traditional Vishing or Voice Phishing methods that directly attempt to steal account credentials and personal information. The scammer records the victim’s voice...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.