Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
A longitudinal analysis of the privacy paradox
The privacy paradox states that people’s concerns about online privacy are unrelated to their online sharing of personal information. Using a representative sample of the German population, which includes 1403 respondents who were interviewed at three waves separated...
A quarter of UK businesses have been cryptojacked, reveals new research
Malta Winds
Un cuarto de las empresas londinenses han sido víctimas del cryptojacking
Morocotacoin
A quarter of UK businesses have been cryptojacked, reveals new research
London, 17 September – Cryptojacking has already affected large numbers of UK businesses, according to new research from CybSafe, the cyber security awareness and data analytics company. In CybSafe’s survey of 250 IT decision-makers at UK small and medium-sized...
Password advice shouldn’t be boring: Visualizing password guessing attacks
Users are susceptible to password guessing attacks when they create weak passwords. Despite an abundance of text-based password advice, it appears insufficient to help home users create strong memorable passwords. We propose that users would be empowered to make...
CybSafe research: cryptojacking is increasingly popular
Cryptonomist
Ecuador citizens’ data breach holds lessons for enterprises
Computer Weekly
Research on industrial Internet of Things security architecture and protection strategy
Industrial Internet of Things (IIoT) is a fusion of industrial automation systems and IoT systems. It features comprehensive sensing, interconnected transmission, intelligent processing, self-organization and self-maintenance. Its applications span intelligent...
2 in 5 UK SMEs have experienced impersonation phishing attacks in the past year
Whitehall Media
Implementation of machine learning and data mining to improve cyber security and limit vulnerabilities to cyber attacks
One of the significant challenges in the realm of cyber attack detection is the scarcity of training data, which remains a formidable obstacle. Despite the utilization of established network monitoring tools like Wireshark, a vast number of individuals are still at...
#privacy: Almost half of UK SMEs targeted by phishing attacks
GDPR Report
A look into the frequency and success of phishing attacks on SMEs
Help Net Security
Phishing-Angriffe richten sich gegen britische KMU
Todotech
Phishing attacks target UK SMBs
BetaNews
Nearly half of UK SMEs hit by phishing attacks
ITProPortal
43% of SMEs experienced phishing attack in the last 12 months
Comms Business
Businesses Blighted by Impersonation Phishing Attacks
Infosecurity Magazine
Measuring Cyber Security Culture Whitepaper
Measuring cybersecurity culture An intelligent and scientific approach to people-centric cybersecurity cultureMuch has been written about the benefits of a secure culture. By contrast, very little has been written about how to develop a secure culture. This whitepaper...
The Big Interview: Meet the counterterrorism expert turned cybersecurity entrepreneur
CRN
The relative impacts of disclosure and secrecy: The role of (perceived) target response.
This review examines the current trends in understanding the impact of individuals' decisions to either disclose information or continue to conceal it. As a whole, the evidence points to a relative benefit of disclosure over secret-keeping, but with clear cases, in...
CRN Awards Shortlist 2019
CRN