Voting on paper is best. Letting computers help is bound to lead to trouble, experts say. And using a blockchain…
The recent Twitter breach involving Bitcoin transfer scams is not a new concept. SlashNext’s Threat Lab sees dozens of phishing…
In what feels like society’s longest five-month stretch in a generation, it has become cliché to comment that the global…
The headline is eye catching: a data breach at a highly respected security training organization when an employee falls for…
Last week, President Donald Trump threatened to ban the popular social media platform TikTok, whose corporate owner is a Chinese…
Email Account Takeover (ATO) attacks occur when a threat actor gains unauthorized access to an email account belonging to someone…
A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous…
In This Issue: "The Next Generation of Hackers". Being a hacker requires curiosity, certain computer security skills, and a mindset…
Last week, the US Department of Justice (DOJ) charged three men for their alleged roles in one of the largest…
Researchers discover pro-Russian narratives being spread via hacked news websites, aimed at attacking NATO.