UK cyber security professionals have identified Russia and China as the countries that produce the most skilled hackers, according to a survey carried out by information security consultancy. A lot of people believed that the hackers with the highest skills come from Russia.
Almost a third of respondents surveyed at a recent IT conference linked the success of their overseas counterparts to a combination of more investment, better education and political motivations. Russia has long been recognised for being behind various malware strains and exploits. Recently, it was reported that Russian hackers had exploited a bug in Microsoft Windows dubbed Sandworm to perform cyber espionage on NATO.
Read moreA survey by One Poll and Dimensional Research on holiday shopping security practices evaluated online cybersecurity awareness of consumers from the USA and United Kingdom, and revealed that a lot of people believe emails from “trusted brands” are safe to click, and some respondents anticipate doing at least part of their holiday shopping while at work.
Cybercriminals are very resourceful, and they know that the siren song of a good deal is almost always irresistible to bargain hunters. The number one reason to click is trust in a brand, which isn't good there are some very convincing phishing emails that look nearly identical to the real thing.
Read moreMost consumers do not feel safe when shopping online and many are shying away from their favorite retailers as a result. The survey, which questioned 10,000 people in the USA and United Kingdom.
The survey found that people are uncomfortable sharing sensitive financial and personal information when they shop and interact with organizations online. However, demand on retailers to address security is reaching a critical point. The recent spate of high profile data breaches has clearly had an impact on online trust, and consumers are now placing responsibility squarely with retailers to tackle this issue.
Read moreUK to take action to close down Russian website streaming images from British webcams including baby monitors and those in gyms and bedrooms. The UK is to take international action to close down a Russian website that is streaming images from British webcams including baby monitors, bedroom cameras and gym.
The site feature live feeds from households and businesses across the world, including a gym in Manchester, a bedroom in Birmingham and an office in Leicester. The site highlighted the importance of setting secure passwords on devices that have access to the internet. It has become the source of concern for data watchdogs across the world.
Read moreConsumers experienced a wide range of data privacy and security threats in the third quarter of 2014 as hackers successfully conducted large-scale attacks against financial services and retail companies as well as consumers' personal online accounts and identities.
Between July and September of this year, there were a lot of breaches reported worldwide, an increase compared to the same period last year, and millions of customer accounts and data records containing personal or financial information were either stolen or lost. Individuals also felt the data privacy pinch with breaches occurring across three major consumer activities: their banking, shopping, and online identities.
Read moreMost computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.
Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.
Read moreA company that develops cyber security and information security products and services to defend organizations against cyber attacks and to protect critical assets has published a new report and introduced a list of countries most under threat from cyber attack.
APTs are complex attacks by hackers for which complicated techniques are used to sneak into a network and carry out prolonged information gathering attacks. They are often carried out by state-backed players or sophisticated criminals and have an element of human control, in contrast with some cyberattacks solely carried out by an automated piece of code.
Read moreInventors of surveillance systems reported to authorities that it is possible to track absolutely any user who has a mobile phone, and the location of a person is not important, it doesn’t matter whether he is near or in another country.
The most famous intelligence services around the world, such as the National Security Agency of the USA and The Government Communications Headquarters of the United Kingdom use information from mobile phones for a long time. However, due to the new systems in countries that are less developed technically, it is possible to track people around the world easily. How does the system work?
Read moreIn Newcastle the 22-year-old computer science student Christopher Wilson was sentenced to 6 months coercive detention for not revealing the password that is required to decrypt the data on his computer.
He was urged to do this in “the interests of national security”. Wilson is accused of fooling police with cyber attack warnings as well as encouraging people to post deliberately inflammatory messages on a Facebook condolence page that was set up for two killed police officers. Wilson was already suspected to have sent rampage warning mails to the University of Newcastle. Two of these mails could be tracked back to Northumbria University where he was studying at that time.
Read moreCommunications between British on social networks are considered external and can be intercepted.
The British government has asserted the right to intercept communications that go through services like Facebook, Google and Twitter that are based in the United States or other foreign nations, even if they are between people in Britain. The report says that the findings are based on a government document that the groups obtained through a lawsuit. The government document says contact between British people through social networks based elsewhere, or use of search engines located outside Britain, constitutes “external communication,” and as such, is subject to interception, even when no wrongdoing is suspected.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland