The Latest in IT Security

Posts Tagged ‘data protection’

From as early as 2014, common vulnerabilities in Signaling System 7 (SS7) have been spotlighted for allowing cybercriminals to spy on conversations and text messages on mobile phones, but also track location by simply knowing the victim’s phone number. Having ignored the warning signs, the telecom system is now used to bypass two-factor authentication and hack into users’ bank accounts.

Read more ...

The UK’s definition of an SME — a small to medium enterprise — is any business with up to 250 employees, but no upper floor on the financial threshold. Speaking at the Counter Terrorism Expo in London’s Olympia today, the Federation of Small Business’ Home Office and MoJ Policy Unit Chair Richard Parlour laid out just why cyber security is so critical for the sector.

Read more ...

There’s now a new tool that could allow companies to quickly block communications between malware programs and their frequently changing command-and-control servers.
Threat intelligence company Recorded Future has partnered with Shodan, a search engine for internet-connected devices and services, to create a new online crawler called Malware Hunter.

Read more ...


Categories

MONDAY, APRIL 21, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments