Why display the URL bar on a mobile device when you can give users more screen space by hiding it? Google Chrome for Android does just that after a page has loaded, concealing information about the URL and expanding the screen space available to display content from the web page. Read full story.
The City of Stratford is continuing to deal with the fallout of a cyber-attack and it will likely day days before services return to normal. The virus locked city staff out of their own systems and encrypted the date, the process to reverse this is said to take several days. Read full story.
Cybercriminals are launching more targeted phishing attacks than before, with specific job roles being targeted, new research has found. Phishing refers to the tactic of hackers targeting specific people within an organisation with the goal of extracting sensitive information or credentials, is extremely popular nowadays. Read full story.
CYBER attacks against businesses have rocketed with six out of ten companies reporting at least one incident last year, a survey has revealed. The financial cost related to cyber crime also sharply increased, with the average loss reported at £283,000 — up nearly two thirds on the previous year. Read full story.
The personal data of almost 1,000 girls and their families is at risk after a hacking attack on a Birmingham school. Parents with children at Kings Norton Girls’ School were told there was an “extremely small but potential breach of personal data relating to you and your child”. Read full story.
The panel, Convergence in an increasingly cyber enabled age, was chaired by Philip Ingram MBE, and participants included consultant Peter Houlis, Ellie Hurst of consultancy and training provider Advent IM, Andrew Tsonchev, Director of Technology at Darktrace Industrial, and Patrick McBrearty, a ‘Cyber Patrol Officer’ for the West Midlands Police Regional Cyber Crime Unit. Read […]
How should businesses plan to survive a potential cyber attack extinction event? Up to recent time, perhaps the past couple of years, when I talked about the possibility of an extinction event from a cyber attack, the perspectives of the vast majority of people were still entirely focused on this being an exfiltration, manipulation or […]