Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Cyberattacks are getting worse, but most people aren’t taking basic security steps
VentureBeat
Investigating cyber security factors influencing the perception behavioral intention of small and medium enterprise
This study investigates the perception of cyber security among MSMEs, particularly those new to technology, utilizing the Protection Motivation Theory (PMT) model. Data is gathered through surveys and analyzed quantitatively using Smart-PLS software. Several variables...
Irish university computer systems taken offline after cyber attack
Computing
How to make your security awareness training more effective
In the UK alone, 39% of companies have fallen victim to a cyber breach or attack over the past year. Organizations face a host of consequences when their systems are hacked. For starters, the average financial cost of a cyber breach to British firms is $3.88 million!...
Olympus suffers a suspected BlackMatter ransomware attack
CPO Magazine
A second MoD data breach endangers lives of 55 Afghan individuals
ProPrivacy
What exactly is security awareness strategy?
Did you know that most cyber breaches occur due to human error? That’s because most people aren’t aware of the cyber security threats that put themselves and their organisations at risk! Without basic security awareness, we're more likely to click on phishing links or...
The five most important ransomware attacks of 2021
Raconteur
The Digital Pandemic – Ransomware
Security Boulevard
Perceived vulnerability as a determinant of increased risk for cyber security risk behavior
There is interest in better understanding people's cybersecurity (CS)-related attitudes and behaviors, which are ultimately impacted by their perceived vulnerability to CS risks. This study sought to examine the information security attitudes and behaviors that...
Apple urgently patches exploits across several operating systems
Channel Life
Why language matters in cybersecurity
Language is at the heart of communication. Every time we speak or write, we choose language appropriate to our audience to get our desired message across. Why should it be any different in cybersecurity? Yet, the cybersecurity industry has a problem. Too often,...
Olympus likely victim of BlackMatter ransomware attack
Computer Weekly
Applying behavioural science to cybersecurity
Tech Monitor
Passive and active training approaches for critical infrastructure protection
In order to strengthen Critical Infrastructure's protection and resilience, it is central to invest in training and simulations, to spread a security culture and develop the awareness among all personnel involved in the Critical Infrastructure security. Nowadays,...
COVID-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies have shown...
Week in review: ProxyShell and Realtek SDK vulnerabilities exploitation, automated pentesting
Help Net Security
Locked the car, why not the computer: A qualitative and quantitative study on data safety compliance
Information technology has become an integral part of healthcare within the United Kingdom's National Health Service (NHS). All healthcare professionals are required to possess a certain level of computer knowledge and adhere to cyber ethics standards, which are...
22% of cybersecurity incidents in H1 2021 were ransomware attacks
Help Net Security
Hackers targeting vulnerable UK government and police servers
Information Age
Half of MS Exchange servers at risk in ProxyShell debacle
Computer Weekly