Home Tags Cyber Crime

Cyber Crime Related Content

Cyber Crime meaning computer-orientated crime is on the rise. Over the last six years there have been over 3 billion record breaches. Cyber Crimes can be described as actions committed against a group or an individual with criminal motive to intentionally damage the people involved. Regardless of whether you run a business or have a mobile phone, everyone is at risk of a cyber attack. Cyber Crimes that cross the borders of countries and threaten foreign organisations are sometimes referred to as Cyberwarfare.

Forms of Cyber Crimes

These Crimes can come in many different forms most common of which being, Phishing, File Hijacker, Screenshot manager, Hacking etc.
Therefore considering the rapid increase of Cyber Crime, it is essential that cyber security professionals keep updated with development and learning how to prevent and recover from attacks.

 

man imprisoned, Nguyen Ngoc Anh

Vietnam: Man imprisoned for making facebook post

Internet censorship in Vietnam is a consistent fear exemplified in the case of Nguyen Ngoc Anh, a man imprisoned for creating a facebook post.
pegasus spyware, whatsapp attacks

WhatsApp attacks: Pegasus spyware hacks 1400 users

WhatsApp have launched a legal case against the NSO group, for hacking the encrypted messaging platform with their Pegasus spyware which roughly impacted 1,400 users.
revenge porn investigation, image based sexual abuse

Pornhub refuse to help police in revenge porn investigation

Recently, Pornhub failed to cooperate with revenge porn investigations by CPS, who are questioning why these images are hosted on their platforms at all.
personal information

The Lancaster University data breach: Safeguarding students personal information

Organisations like universities that handle significant amounts of confidential and personal information are increasingly being targeted by cyber criminals. In this article SecureTeam looks at the damage data breaches are causing in UK universities.
illegal content online

Cybercrime, illegal content online: We don’t have to turn a blind eye

Marsali Hancock from EP3 Foundation underlines that we don’t have to turn a blind eye concerning cybercrime, illegal content and harmful activities online.
CISOs, cloud and cybersecurity

Top five areas of focus for CISOs when it comes to the cloud and...

Chief Information Security Officers (CISOs) have a key role to play in safeguarding the data increasingly stored in the cloud and mitigating cybersecurity threats, while also ensuring compliance with IT regulations, standards, and policies.
civil service email leaks

Why trust at face value can’t fix the civil service email leaks

Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.
Voice Command Virtual Assistant

The Secrets Behind Voice-Command Virtual Assistants

"10 Minutes, I'll Give You The Truth About Smart Speaker and Virtual Assistants". Marsali Hancock of the EP3 Foundation discusses.
cybersecurity in hospitals, hospitals and care centres

Cybersecurity in hospitals and care centres

Dr Peter Leitner and Stela Shiroka, at INTERSPREAD GmbH, detail cybersecurity in hospitals and care centres and their thoughts on the need for increased awareness and enhanced training capabilities in Europe.
political hacktivism, future cyber skills

Political hacktivism: Future cyber skills shortage under the spotlight

34% of the UK public is concerned with the rise in political hacktivism aimed at disrupting democratic processes, such as general elections and referendums.
pegasus spyware, jamal kashoggi

Pegasus spyware: Will the NSO Group change their policies?

NSO Group has been pressured over revelations its invasive Pegasus spyware was used against journalists such as Jamal Kashoggi.
dangers posed by cryptocurrencies, 51% attacks

Processes, vulnerabilities and dangers posed by cryptocurrencies

Marc Laliberte, Senior Security Analyst at WatchGuard Technologies, looks at the processes, vulnerabilities and dangers posed by cryptocurrencies.
revenge porn, deepfake

UK law to stop social media circulation of “revenge porn”

The Department of Justice is beginning a 3-year review of laws, to ensure that "revenge porn" victims are protected and technologies such as Twitter are fully considered.
vulnerable to cybercriminals

Children are becoming more vulnerable to cybercriminals as IoT device use explodes

Parents often forget about the devices their kids take to school – the increasing number of which is making more children vulnerable to cybercriminals, here Kaspersky recommends tips to help ensure children are kept safe.
rise of cyber-stalking, social media

The rise of cyber-stalking

Ernest Aduwa, Solicitor at specialist criminal defence and civil litigation firm Stokoe Partnership Solicitors, charts the rise of cyber-stalking.
unsecure wi-fi

Does your childs school have an unsecure Wi-Fi network?

Back-to-School season: This year, hackers can get inside your kids' classroom as many schools have unsecure Wi-Fi networks that can be easily hacked.
new phishing scams, mena

Researchers uncover new phishing scams on activists

Research by Amnesty Tech found that new phishing scams are being used to target the email addresses of activists, to determine their location, passwords and secret work.
cyber-secure uk

Deal or no deal: Brexit could be good for cyber security

Chris Bush, Head of Security, ObserveIT discusses why Brexit doesn’t actually have to mean a less cyber-secure UK, in this article.
shorten life expectancy

How can you gain consumer trust in the age of digital regulation and cyber...

Lee Parry is CEO and co-founder of Enigma Recovery, shares his top tips for business owners who are looking for new ways to gain consumer trust when cyber security is at the forefront of all our minds.
deepfake audio, voice synthesis

Fake news: Debunking and defeating deepfake audio

Dr Matthew Aylett delves into the use of deepfake audio; touching on weaponisation and lack of public awareness, whilst reframing the tech as a communication tool for speech-altering diseases.

Follow Open Access Government