Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
How to respond to a cyber attack
Business Advice
Benefit from AI in cyber security
This paper explained the role of AI in cyber security and proposes recommendation how organizations are benefitting from AI in cybersecurity. Machine learning, a component of AI, applies existing data to constantly improve its functions and strategies over time. It...
A systematic review of crime facilitated by the consumer Internet of Things
The nature of crime is changing — estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet connected, collectively referred to as the Internet of Things (IoT),...
A survey on smartphone user’s security choices, awareness and education
Smartphones contain a significant amount of personal data. Additionally, they are always in the user’s possession, which allows them to be abused for tracking (e.g., GPS, Bluetooth or WiFi tracking). In order to not reveal private information, smartphone users should...
Some cyberpsychology techniques to distinguish humans and bots for authentication
.In a world where artificial intelligence is one of the greatest assets, unmanned operations seem to be the future. The world of cybersecurity is witness to numerous system break-ins for the purpose of gaining access. One of the ways to gain access to systems is...
WHAT IS LEVEL39? AND HOW IS IT REVOLUTIONISING THE LONDON TECH SCENE?
Business Leader
WHAT IS LEVEL39?
Business Leader
Meet the innovators
South West Business Insider
Security Excellence Awards shortlist recognises success
Computing
Identification and prevention of social engineering attacks on an enterprise
In recent times, the integration of technology in everyday tasks helps in making most of the cumbersome work more convenient. This integration has brought about a positive wave in aiding and assisting humans in various sectors such as the military, health, education,...
Breach of Ecuador citizens’ personal data holds key privacy lessons for enterprises
Computer Weekly Magazine
Over 40 per cent of SMEs have been attacked
Channel Info
One Quarter Of Surveyed UK Businesses Suffered From Cryptojacking, Security Firm Says
Crypto Briefing
A longitudinal analysis of the privacy paradox
The privacy paradox states that people’s concerns about online privacy are unrelated to their online sharing of personal information. Using a representative sample of the German population, which includes 1403 respondents who were interviewed at three waves separated...
A quarter of UK businesses have been cryptojacked, reveals new research
Malta Winds
Un cuarto de las empresas londinenses han sido víctimas del cryptojacking
Morocotacoin
A quarter of UK businesses have been cryptojacked, reveals new research
London, 17 September – Cryptojacking has already affected large numbers of UK businesses, according to new research from CybSafe, the cyber security awareness and data analytics company. In CybSafe’s survey of 250 IT decision-makers at UK small and medium-sized...
Password advice shouldn’t be boring: Visualizing password guessing attacks
Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance of text-based password advice, it appears insufficient to help home users create strong memorable passwords. We propose that users would be empowered to make...
CybSafe research: cryptojacking is increasingly popular
Cryptonomist
Ecuador citizens’ data breach holds lessons for enterprises
Computer Weekly
Research on industrial Internet of Things security architecture and protection strategy
Industrial Internet of Things (IIoT) is a fusion of industrial automation systems and IoT systems. It features comprehensive sensing, interconnected transmission, intelligent processing, self-organization and self-maintenance. Its applications span intelligent...