Phishing attacks are more rampant than ever before, rising by more than 162 percent from 2010 to 2014. They cost organizations around the globe $4.5 billion every year and over half of internet users get at least one phishing email per day. The best defense companies have against phishing attack...
- Tuesday, 20 February 2018 02:46
- By David J. Redcliff
As a follow up to our recent article on how to spot and stop phishing attempts, we’re now going to focus on the difficulty of recognising phishing and email spoofing attempts on mobile devices and how to overcome this. img src="https://www.beaming.co.uk/wp-content/uploads/SamPhone1-370x312.png" a...
- Monday, 19 February 2018 02:30
- By Barbara Larson
Consumers are daily targets of email and phone scams, not to mention the frequent cyber attacks on big data. So it’s never been more important to safe lock your online security as best as you can. “The scams are changing every day and consumers aren’t knowledgeable about the new scams that a...
- Thursday, 15 February 2018 02:38
- By Carol R. Venuti
Being online is part of daily life, with Wi-Fi hotspots, mobile internet, and broadband connections spanning almost all of Britain, US and other developed countries. While this gives us an overwhelming amount of information at our fingertips, it also exposes surprisingly large amounts of our persona...
- Tuesday, 13 February 2018 07:53
- By Anna K. Sasaki
Cyber-crime has become one of the greatest threats to businesses, government institutions, and individuals, as hackers are constantly finding new targets and advanced tools to break through cyber defenses. As technology improves, new vulnerabilities are discovered and new obstacles challenge securit...
- Wednesday, 07 February 2018 02:16
- By Jennifer Levin
Young people are far more likely to have a positive experience surfing the internet than a negative one. That’s according to new research released to coincide with Safer Internet Day, which is being celebrated around the world today. However, young people’s digital lives are increasingly a doubl...
- Tuesday, 06 February 2018 04:51
- By David J. Redcliff
Cybercrime is everywhere, and the least you can do is read up about it. You might think Internet and email scams only affect those who are not tech savvy or do not keep up with the daily news, but that is not true. From IT professionals to teachers, to journalists, people from all fragments of soci...
- Friday, 02 February 2018 01:11
- By Alex Grey
How virtual private networks (VPNs), proxy services, and onion routers help block ISPs (and search engines) from harvesting user data — and which of these internet privacy tools to choose. Years ago when Google, Bing, Yahoo, Facebook, Amazon, and hundreds of other organizations began harvesting a...
- Friday, 26 January 2018 05:34
- By Barbara Larson
A Google engineer has revealed that despite Gmail being introduced ten years ago, the vast majority of email account users are still not using one of Gmail’s best features. Speaking at the recent Enigma 2018 security conference, Grzegorz Milka, a software engineer for the tech giant, said that o...
- Wednesday, 24 January 2018 02:37
- By Anthony Frank
Let’s talk seriously about industrial cybersecurity: What you don’t know can hurt you. Industrial cyber security is all over the news, and not in a good way. Our most vital industries – including power, water, nuclear, oil and gas, chemical, food and beverage, and critical manufacturing – ar...
- Thursday, 18 January 2018 05:20
- By Olivia Russell
Don't think the police will help you find, let alone catch, cybercriminals if they make off with your corporate loot. And don't think this is only a problem for companies in other countries. South African businesses, like South Africans themselves, are increasingly being targeted. The story of a loc...
- Thursday, 18 January 2018 01:56
- By Bridget Miller
Columnist Wesley Young covers a growing storm of events that are likely to culminate in substantial regulatory change and analyzes the impact that can have on the local search industry. Most marketing professionals don’t give much thought to the regulatory climate. In the US, unlike Europe, privac...
- Wednesday, 10 January 2018 05:20
- By Grace Irwin
2017 WAS BANANAS in a lot of ways, and cybersecurity was no exception. Critical infrastructure attacks, insecure databases, hacks, breaches, and leaks of unprecedented scale impacted institutions around the world—along with the billions of people who trust them with their data. This list includes...
- Wednesday, 03 January 2018 02:42
- By Bridget Miller
PERHAPS YOU'VE BEEN hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else's voice. If so, you haven't necessarily lost your mind. Instead, if you own one of a few models of the internet-connected speaker and you've been carel...
- Thursday, 28 December 2017 02:44
- By Corey Parker
When Congress voted in March to reverse rules intended to protect Internet users’ privacy, many people began looking for ways to keep their online activity private. One of the most popular and effective is Tor, a software system millions of people use to protect their anonymity online. But even To...
- Wednesday, 27 December 2017 07:25
- By Alex Grey
Beijing - Apple chief executive Tim Cook has called for future internet and AI technologies to be infused with privacy, security, and humanity. Cook made the comments on Sunday at the opening ceremony for China’s World Internet Conference - an event designed to globally promote the country’s vis...
- Tuesday, 26 December 2017 06:42
- By Alex Grey
Cybersecurity can cause organizational migraines. In 2016, breaches cost businesses nearly $4 billion and exposed an average of 24,000 records per incident. In 2017, the number of breaches is anticipated to rise by 36%. The constant drumbeat of threats and attacks is becoming so mainstream that b...
- Tuesday, 19 December 2017 01:26
- By Anna K. Sasaki
News flashes and sound bites are constantly calling our attention to the latest hacks or threats to our cybersecurity that seem to be filling our social media news feeds and television reporting circuits. While there are plenty of bad actors out there hell bent on doing us harm, symbiotically living...
- Wednesday, 13 December 2017 02:03
- By Clara Johnson
Bitcoin's rise could help lead to the creation of a so-called "decentralized internet," according to a venture capitalist Decentralized internet is the idea that the web is run across a number of machines that are owned by regular users rather than owned in a central place like a server This could ...
- Thursday, 07 December 2017 05:28
- By Issac Avila
Researchers are wielding the same strange properties that drive quantum computers to create hack-proof forms of data encryption. Recent advances in quantum computers may soon give hackers access to machines powerful enough to crack even the toughest of standard internet security codes. With these co...
- Thursday, 07 December 2017 00:51
- By David J. Redcliff
How much information does Google have about me? Our lives have become more integrated online than in any other time in history. We interact with each other online via social media, email, and forums; we conduct business via complex, data-driven channels and innovations; and the culture we encou...
- Monday, 20 November 2017 01:49
- By Anna K. Sasaki
Hackers are savvy users who manipulate computer systems and force them to them to do the unintended. If they do this with wicket intent, we call these people black hat hackers. Hacker tools and specific techniques are constantly changing, but black hat hackers do have some predictable approaches whe...
- Monday, 13 November 2017 01:15
- By Alex Grey
THE WARNINGS CONSUMERS hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender. Only install applications from a trusted source or from a trusted app store. But lately, devious hackers have been targeting their attacks further up ...
- Wednesday, 20 September 2017 06:50
- By David J. Redcliff
Nobody likes internet trolls. They pop up in discussions they weren't invited to and upset as many people as possible. Time and time again we are told the best thing to do is ignore the inflammatory, abusive things they put on forums, comment threads, and even social media posts. However, this is ea...
- Saturday, 16 September 2017 04:06
- By Barbara Larson
Welcome, dear user, to the 21st century. Your house is a computer made of bricks and mortar. Your car can drive itself. Everything from the television set in your living room to the juicer in your kitchen, is connected to the internet. Welcome, indeed, to the age of information and data. Where your ...
- Saturday, 16 September 2017 03:58
- By Alex Grey