Filter news by category
Android users have been put on alert after security experts discovered over a hundred apps on the Google Play Store that are filled with malware.
https://www.express.co.uk/life-style/science-technology/999716/Android-warning-malware-apps-Google-Play-Store-Windows-malicious-software
US prosecutors have charged a North Korean man alleged to have been involved in creating the malicious software used to cripple the UK’s National Health Service.
https://www.bbc.co.uk/news/technology-45440533
As security controls have improved, cyber attackers are increasingly focusing their efforts on people within organisations as a way into corporate IT systems
https://www.computerweekly.com/news/252448101/People-top-target-for-cyber-attackers-report-confirms
Police have issued a warning over a rise in fraud sparked by technological advances.
http://www.barrheadnews.com/news/16689874.technology-helps-fraudsters-cash-in/
Business email compromise is increasingly popular with cyber criminals to steal money and information as well as spread malware
https://www.computerweekly.com/news/252447909/Fraudulent-money-transfers-are-top-aim-of-business-email-compromise
A North Korean hacking group is targeting cryptocurrency exchanges using Trojanised cryptocurrency trading software designed for both Microsoft’s Windows and Apple’s Mac OS
https://www.computerweekly.com/news/252447492/North-Koreans-add-Mac-OS-to-cryptocurrency-stealing-malware-attacks
There are key differences and potential challenges when it comes to security teams and C-suite executives communicating and aligning about cyber threats
https://www.computerweekly.com/news/252447705/Security-teams-and-C-suite-exec-views-not-aligned
Organisations are implementing the ISO 27001 standard in recognition of the fact that cyber attacks are increasingly inevitable and that it is best to be well-prepared to fend off attacks and mitigate their effect
https://www.computerweekly.com/news/252447725/Improving-security-top-driver-for-ISO-27001
Cyber criminals are moving away from mass, high-profile attacks to one’s stealthy and more subtle – as well as attacks targeting systems typically used in critical infrastructure
https://www.computerweekly.com/news/252447650/Cyber-attackers-switching-to-covert-tactics
Security researchers discover new campaign using two malicious links to double the chances of infection, which is believed to be linked to a notorious cybercrime group
https://www.computerweekly.com/news/252447829/Cobalt-cyber-heist-group-mounts-new-campaign
Search articles by keyword
Midlands Fraud Forum Ltd. Reg.No: 06436330 Copyright © 2023 Disclaimer & Privacy Policy