Jay Jay

Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'

Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'

Forcepoint Security Labs has found that Microsoft Sway, a member of the Office 365 group of apps, has been used by malicious actors to send phishing links to targeted users.

Businesses 'risk GDPR breaches' as they underestimate threat from insiders

Businesses 'risk GDPR breaches' as they underestimate threat from insiders

Businesses overestimate the danger from outside threat actors while discounting the threat from insiders because of a failure to understand their GDPR-related risks, according to a new survey.

Emergence of new ransomware variants feature names of popular politicians

Emergence of new ransomware variants feature names of popular politicians

Earlier this month, security researchers stumbled upon a "Barack Obama's Everlasting Blue Blackmail Virus Ransomware", a new ransomware variant that only encrypted .exe files rather than user data files.

Researcher discovers buffer overflow vulnerability in Microsoft's JET Database Engine

Researcher discovers buffer overflow vulnerability in Microsoft's JET Database Engine

Microsoft has issued a patch for a buffer overflow vulnerability that would enable an attacker to crash Excel in operating system ranging from Windows 7 to Windows 10.

Email fraud attacks on firms registered 85% rise in Q2 compared to year-ago-quarter

Email fraud attacks on firms registered 85% rise in Q2 compared to year-ago-quarter

Lower-level management workers were at the receiving end of 60 percent of all email fraud attacks, but upper-level managers received a disproportionately large share of attacks at 23.5 percent.

Will the Met Police's financial crisis impact its war on cyber-crime?

Will the Met Police's financial crisis impact its war on cyber-crime?

Cuts since 2011 have cost the Met Police more than £700 million in funding, or nearly 40 per cent in real terms, while cyber-crime is rising, and acquiring and keeping cyber-specialists becomes harder.

Poor SSH Key Management leaving banks vulnerable to cyber-attacks

Poor SSH Key Management leaving banks vulnerable to cyber-attacks

The importance of a robust SSH key management policy is often underrated or ignored by many organisations, even though thousands, in some cases millions, of SSH keys are used by organisations.

EMEA firms lagging behind US in firewall management & innovation

EMEA firms lagging behind US in firewall management & innovation

Recent attacks highlight the importance of firewall management, the continuous monitoring of open ports and what firms need to do to prevent similar incidents from occurring in the future.

Businesses will lose over 146 billion data records between now and 2023

Businesses will lose over 146 billion data records between now and 2023

Organisations globally, whether small, medium or large, will lose over 146 billion records between 2018 and 2023 as a result of static cyber-security spending and slow adoption of AI and predictive analytics,

"Foreshadow" vulnerability in Intel chips exposing L1 cache data to hackers

"Foreshadow" vulnerability in Intel chips exposing L1 cache data to hackers

A new speculative execution vulnerability in modern x86 microprocessors from Intel allows a malicious attacker to gain access to data stored in the L1 data cache of such microprocessors.