China To Adopt The Controversial Cyber Security Law

Cyber Security China is set to adopt a controversial cyber security law after Members of Parliament conducted a second reading of the new rules that carry significant consequences both for foreign and domestic business and put greater censorship in jeopardy. Widespread regulations over the internet are regularly enforced in the country, and Parliament has sought …

Read moreChina To Adopt The Controversial Cyber Security Law

Hacker Behind DNC Hacking Refutes Russian Link

The person who claimed responsibility for hacking the Democratic National Committee (DNC) denied allegations that the Russian government has employed him. In a blog post, Guccifer 2.0, who claimed responsibility for hacking DNC, said once again that he is not working for Russia as alleged by security experts. Additionally, he released more emails as well …

Read moreHacker Behind DNC Hacking Refutes Russian Link

New Phishing Techniques Used By Fraudsters

Phishing Malware researchers and security experts who are on the “watch” have recently reported an unusual phishing technique. Phishing is the name that is given to a fraudulent practice whereby tricksters send emails as if from reputed companies with the aim of inducing the recipients to part with their personal details such as credit card …

Read moreNew Phishing Techniques Used By Fraudsters

Singapore Government To Cut Internet Access In May 2017

A country known for a multitude of strict rules and regulations, Singapore will soon be faced with the tough decision of its government in the name of cyber security. Come May next year; internet access will be blocked from a vast number of computers that are accessible by public servants. Over 100,000 computers will be …

Read moreSingapore Government To Cut Internet Access In May 2017

New Cyber Security Caucus Has Been Announced

Colorado Senator Cory Gardner and his Virginia counterpart Mark Warner announced the launch of the Senate Cyber Security Caucus on Tuesday, June 14 at the American Enterprise Institute (AEI). The caucus is set to focus on cyber security from some perspectives, including the economy and the national security. While caucuses by their very nature aren’t …

Read moreNew Cyber Security Caucus Has Been Announced

Protecting your business and staff from the threat of cyber & physical terrorism

Unfortunately, we live in a time where we all face the ever looming threat of terrorism, at home, overseas and digitally. MI5 have stated that terrorism is a significant threat to businesses all over the UK, and as result companies need to protect themselves, and their employees, from attacks. To do this; however, it’s vital …

Read moreProtecting your business and staff from the threat of cyber & physical terrorism

How to Keep Your Smartphone Safe from Snoopers

Text Spying

In today’s digital era, everyone is dependent on their smart gadgets. The very fact that all our important data like emails, passwords, and others are primarily stored on our smartphones is enough reason to exercise a few mobile security steps to make sure your data and information do not get into the wrong hands. Here …

Read moreHow to Keep Your Smartphone Safe from Snoopers

Cyborgism – A Look into the Security Issues of the Future

Cyborgism

For me, a cyborg is someone who feels their technology is a part of their biology, they have integrated a device or devices into their body and this has added something to their senses or capability above and beyond what’s currently normal for humans. says Neil Harbisson, Cyborg activist and president of Cyborg Foundation. Cyborgs …

Read moreCyborgism – A Look into the Security Issues of the Future

Is Technological Growth Creating More Security Loopholes?

Is Technological Growth Creating More Security Loopholes

Most security experts confirm that technology is increasing at such a fast and crazy pace, but security solution isn’t keeping up with it. Over the years, technology has evolved at an exponential rate, from laptops to tablets, wearable devices, drones, IoT/IoE (Internet of Things/Internet of Everything), RFID & NFC based systems, connected cars and smart …

Read moreIs Technological Growth Creating More Security Loopholes?