Digital future: Are we ready for what’s next?

The Internet Society (ISOC), a global non-profit dedicated to ensuring the open development, evolution and use of the Internet, released “Paths to our Digital Future”, a report aimed at exploring the future of the Internet. Artificial intelligence and the Internet of Things hold huge potential to simplify and enhance people’s lives – but only if…

Chrome will tag FTP sites as “Not secure”

Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome security team has shared. This change is part of Google’s continuous effort to “accurately communicate the transport security status of a given page.” “We didn’t include FTP in our…

Organizations are uncovering a cloud security paradox

The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in order to compete in the digital era, but are bogged down by legacy technologies and inefficient siloed processes and tools that are ill-equipped to handle today’s volume of data.

Why end-to-end encryption is about more than just privacy

The question of whether regular people need end-to-end encryption will surely be debated for quite some time. But for Alan Duric, CEO and co-founder of Wire, the question can only have a positive answer. As he told the audience at the FSec security symposium in Varazdin, Croatia, end-to-end encryption is about more than just privacy…

Phishers targeting LinkedIn users via hijacked accounts

A new phishing campaign has been spotted hitting LinkedIn users via direct messages and the LinkedIn InMail feature. They are sent from legitimate LinkedIn Premium accounts that have been hijacked by the phishers, thus increasing the likelihood that recipients will trust the message and click on the link. The messages/emails say that the sender has…

Insurers increasingly concerned about silent cyber exposure

Around half of industry practitioners see the risk of silent cyber exposure – potential cyber-related losses due to silent coverage from insurance policies not specifically designed to cover cyber risk – as growing over the coming year, according to Willis Re. Silent cyber exposure In the Willis Re survey, respondents were asked to assess the…

13% of SMBs have experienced an IoT-based attack

One in four companies have already experienced a ransomware attack and one in eight have dealt with an IoT-based attack, according to Arctic Wolf Networks. As mid-market companies continue to embrace IoT without implementing the necessary security tools, these attacks and vulnerabilities will persist. Despite the lack of precautionary measures, organizations are well aware of…

BH Consulting launches scholarship programme to address infosec skills gap

BH Consulting, an information security specialist company, has launched a Masters Scholarship programme to encourage talented people to enter the cybersecurity market. Under the programme, a successful applicant will start a fulltime traineeship role as an information security analyst, while studying for a fully paid two-year MSc in Applied Cyber Security at the Institute of…

How Large Businesses Approach Cybersecurity Today

Over 90% of large US companies with 500+ employees have a cybersecurity policy in place to protect them from both real and anticipated threats. Clutch surveyed over 300 corporate IT decision-makers about what to include in a cybersecurity policy and found security software, data back-up and storage and scam detection are the most common areas…