Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Schroder UK Public Private Tst plc Investment in Tessian
ADVFN UK
Schroder UK PublicPT : Investment in Tessian
Investegate
Mazephishing: the COVID-19 pandemic as credible social context for social engineering attacks
Although the pandemic is certainly not the first occurrence of socially disruptive circumstances that drive cyber criminals to action, relevant academic scholarship has remained scarce. To fill this gap in literature, and propose the analytical framework of...
Personalising cybersecurity in the workplace
Most cyber security solutions take a one-size-fits-all approach. Everyone gets the same training and the same simulated phishing emails. Yet, we all respond to cyber threats in different ways. Our personalities and differences often play a key role in how we act. For...
What’s going on with the HSE cyber-attack?
Silicon Republic
Irish health service latest victim of cyber crime
Building Better Healthcare
UK smart city cyber plan: `A brilliant start”, say experts
Verdict
Ransomware: Economic impact analysis
The questions this project addressed include: How is social engineering used to deploy malware? What is the economic impact of successful malware/ransomware attacks? What security measures can be implemented to help mitigate these attacks? This research focuses on...
Adversarial ‘intended’ use of technology and the need for new threat models addressing human harms
The need for new threat models is considered first through a study of user behavior and perceptions of norms with respect to phone sharing and access behaviors in romantic relationships. We find that most people give their partner access to their phone but often have...
Impact of human vulnerabilities on cyber security
Humans play a major role in the field of cybersecurity. It is observed that more than 39% of security risks are related to the human factor, and 95% of successful cyber-attacks are caused by human error, with most of them being insider threats. The major human factor...
Understanding and deciphering of social engineering attack scenarios
Malicious scammers and social engineers are causing great harms to modern society. Knowledge about social engineering (SE) is wide-spread and it exits in non-academic papers and communication channels. Knowledge is mostly based on expert opinion and experience...
Social engineering : introduction to social engineering through real-life hacking attempts
Social engineering is influencing someone to gain something to yourself but it can be used in a malicious and criminal purposes also. The task was to investigate what different methods are used and how it is used as a tool in cyber attacks. The statistics were...
Psyber security: a new emerging topic and research area within human security – part 2
In today’s digital world, everyone interacts with technology in one way or another, which leaves all technology users vulnerable to psyber security attacks. Because of the recent emergence of the subject of psyber security, and the infantile stage of research...
Hackers hit Apple with ransomware, MacBook design files exposed
Security Brief
Burnout in the tech industry
We need to talk about burnout. Sadly, it’s something most of us will be all too familiar with, particularly in the tech industry. A post-pandemic study revealed 62% of cyber security professionals found their role stressful. This year, the lines between work and home...
IQ Capital founder takes chair role at BVCA
Business Weekly UK
Developing a Privacy and Cybersecurity Training Program for Employees
Lexology
How does personality influence your cyber risk?
People are central to cyber security. Empowered with the right skills and tools, people can protect themselves and their organisations from cyber attack. But people aren’t all the same. Each of us has our own personality. And studies show links between our...
“Get a red-hot poker and open up my eyes, it’s so boring”: Employee perceptions of cybersecurity training
To understand employee negative perceptions of SETA programs, researchers conducted in-depth interviews with 20 Australian employees regarding their experiences with both SETA programs and non-cybersecurity related workplace training. As expected, employees had a...
Most active deep tech investors in the UK
TechSPARK
How to build good cyber security habits
We are all creatures of habit. Some habits we’d rather get rid of. But others can be beneficial. When it comes to cyber security, building good habits is essential. By building better security behaviour into our lives, we reduce our cyber risk. So how do we go about...