Gaming Industry at Great Risk for Cyber Attacks
Cybercriminals have been increasing their attention to the gaming industry as an easy way to get access to credit card information. In a process known as “credential stuffing” criminals target their attacks using pre-existing stolen identifications, giving them the ability to make lucrative profits. The gaming industry as a whole is aware of the cybersecurity […]
Should we be Worried about Internet of Things (IoT) Security?
As more of our devices become internet-enabled, it seems that IoT is forging ahead to appease our demand for ease of use. However, there are some problems with this process. As we access all of these wondrous tools that are connected to our network, very few people are asking the critical question: are they secure? […]
Organised Cybercriminals: Getting Worse, Not Better
Since the 1980’s, security professionals and government agencies around the globe have been trying to place their focus on the main sources of cybercrime. Yet just as the proverbial “leaks in a dam,” they find that they plug one up only to have three more appear. The landscape of cybercrime has not only experienced an […]
5 Major Short List Topics to Help Deter Your Security Risk
Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk […]
Cyber Attack Anatomy 101
Cybercrime is the new “mafia” and if you haven’t taken it seriously in the past, you need to pay attention before you or your company become the latest victim. Cyberattacks are a lot more sophisticated, with many of the organisers setting themselves up in the same way that one would create a real technology company. […]