This week in InfoSec – fridges, phish, backward bikes & why InfoSec pros don’t like Fridays
By in Information Security, on November 9, 2015 at 10:04 am
This week in InfoSec – fridges, phish, backward bikes & why InfoSec pros don’t like Fridays

After a couple of weeks dominated by TalkTalk and other breaches it refreshing to see a slight shift in focus among those commenting on the security industry. This week’s roundup therefore focuses on the Internet of Things, spearphishing, how bad news (or lack thereof) can affect stock prices and why InfoSec professionals should maybe dread Fridays more than Mondays.

M&S website temporarily suspended after leaking customers’ details
By in Information Security, on October 29, 2015 at 4:03 pm
M&S website temporarily suspended after leaking customers’ details

Data breaches come in many different forms and sizes. Not all are a result of malicous hackers, but each can be just as devastating when victims’ personal information falls into the wrong hands.

What security & privacy risks does the Internet of Things present?
By in Information Security, on October 27, 2015 at 3:37 pm
What security & privacy risks does the Internet of Things present?

With the continual evolution of the internet and the devices that connect to it, there was a certain inevitability about the amalgamation of the two. Named the ‘Internet of Things,’ that coming together has opened up a whole new world of possibilities. But have manufacturers fully grasped the concepts of security and privacy surrounding this proliferation of web-enabled devices?

This week in InfoSec – TalkTalk, 2$ Security & Contactless Card Theft
By in Information Security, on October 26, 2015 at 9:54 am
This week in InfoSec – TalkTalk, 2$ Security & Contactless Card Theft

If nothing else, this week’s news has taught us the importance of having an incident response plan in place and reminded us that we are individually all targets for criminals. But it’s not all doom and gloom, as demonstrated by an enterprising 11-year-old who has made secure passwords her business.

How to deal with revenge porn
By in Information Security, on October 15, 2015 at 9:09 am
How to deal with revenge porn

Has someone taken explicit video footage or still images of you and posted it on the internet? If they have, I really feel for you; it’s a horrific, damaging crime. But there is some help out there in the form of the law and specialised support groups run by people just like you.

What is social engineering and how can you avoid it?
By in Information Security, on September 15, 2015 at 11:19 am
What is social engineering and how can you avoid it?

Fool me once… hang on, have I just been socially engineered? It’s not only machines that can be hacked – humans can also be duped by malicious actors who leverage their knowledge of psychology to trick, deceive or otherwise bamboozle their way past security’s weakest link.

What are the risks of mobile banking?
By in Information Security, on September 15, 2015 at 10:59 am
What are the risks of mobile banking?

Do you have money in your bank account? If so, you may wish to keep it there. Read this article to find out how the convenience of online banking could deprive you of your hard-earned cash and learn what you can do to eliminate the risks.

Page 10 of 10