Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Breaching the contract? Using social contract theory to explain individuals’ online behavior to safeguard privacy
This study applies social contract theory to examine whether perceptions of a social contract explains adaptive behavior to safeguard online privacy. We (1) identify and (2) estimate the prevalence of subgroups that differ in their perceived “social contract” (based...
Measuring the impact of intrinsic motivation on information security policy compliance
Most often, security breaches are related to internal employees due to their indirect or direct actions leading to information security policy (ISP) violations. Therefore, understanding employees’ intrinsic motivation and security behaviour towards ISP compliance is...
Moving from a ‘human-as-problem” to a ‘human-as-solution” cyber security mindset
The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change. Benefiting from research in other fields, we...
How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips
Forbes
How to respond to a cyber attack
Business Advice
Benefit from AI in cyber security
This paper explained the role of AI in cyber security and proposes recommendation how organizations are benefitting from AI in cybersecurity. Machine learning, a component of AI, applies existing data to constantly improve its functions and strategies over time. It...
A systematic review of crime facilitated by the consumer Internet of Things
The nature of crime is changing — estimates suggest that at least half of all crime is now committed online. Once everyday objects (e.g. televisions, baby monitors, door locks) that are now internet connected, collectively referred to as the Internet of Things (IoT),...
A survey on smartphone user’s security choices, awareness and education
Smartphones contain a significant amount of personal data. Additionally, they are always in the user’s possession, which allows them to be abused for tracking (e.g., GPS, Bluetooth or WiFi tracking). In order to not reveal private information, smartphone users should...
Some cyberpsychology techniques to distinguish humans and bots for authentication
.In a world where artificial intelligence is one of the greatest assets, unmanned operations seem to be the future. The world of cybersecurity is witness to numerous system break-ins for the purpose of gaining access. One of the ways to gain access to systems is...
WHAT IS LEVEL39? AND HOW IS IT REVOLUTIONISING THE LONDON TECH SCENE?
Business Leader
WHAT IS LEVEL39?
Business Leader
Meet the innovators
South West Business Insider
Security Excellence Awards shortlist recognises success
Computing
Identification and prevention of social engineering attacks on an enterprise
In recent times, the integration of technology in everyday tasks helps in making most of the cumbersome work more convenient. This integration has brought about a positive wave in aiding and assisting humans in various sectors such as the military, health, education,...
Breach of Ecuador citizens’ personal data holds key privacy lessons for enterprises
Computer Weekly Magazine
Over 40 per cent of SMEs have been attacked
Channel Info
One Quarter Of Surveyed UK Businesses Suffered From Cryptojacking, Security Firm Says
Crypto Briefing
A longitudinal analysis of the privacy paradox
The privacy paradox states that people’s concerns about online privacy are unrelated to their online sharing of personal information. Using a representative sample of the German population, which includes 1403 respondents who were interviewed at three waves separated...
A quarter of UK businesses have been cryptojacked, reveals new research
Malta Winds
Un cuarto de las empresas londinenses han sido víctimas del cryptojacking
Morocotacoin
A quarter of UK businesses have been cryptojacked, reveals new research
London, 17 September – Cryptojacking has already affected large numbers of UK businesses, according to new research from CybSafe, the cyber security awareness and data analytics company. In CybSafe’s survey of 250 IT decision-makers at UK small and medium-sized...