Home Tags Cyber Crime

Cyber Crime Related Content

Cyber Crime meaning computer-orientated crime is on the rise. Over the last six years there have been over 3 billion record breaches. Cyber Crimes can be described as actions committed against a group or an individual with criminal motive to intentionally damage the people involved. Regardless of whether you run a business or have a mobile phone, everyone is at risk of a cyber attack. Cyber Crimes that cross the borders of countries and threaten foreign organisations are sometimes referred to as Cyberwarfare.

Forms of Cyber Crimes

These Crimes can come in many different forms most common of which being, Phishing, File Hijacker, Screenshot manager, Hacking etc.
Therefore considering the rapid increase of Cyber Crime, it is essential that cyber security professionals keep updated with development and learning how to prevent and recover from attacks.

 

Cybersecurity and banking

Africa’s Cybersecurity Problems Impact Us All

Africa leads the world in mobile banking and so it is no surprise that banks are one of the biggest targets for cybercriminals.
Securing your data in the cloud

Securing your data in the cloud: All you need to know

David Blevosky, CEO of Cloudhelix, highlights how securing your data in the cloud is straightforward and can protect your business against any expense and reputation damage caused by cyber crime.
importance of cybersecurity

The importance of cybersecurity: Protecting against cyber-attacks

Thorsten Stremlau, Trusted Computing Group’s Marketing Work Group Co-Chair, highlights the importance of cybersecurity, as well as the risks of cyber-attacks and how best to protect against them.
Hacking back

Hacking back: The dangers of offensive cyber security

Morey Haber, Chief Technology Officer, Chief Information Security Officer, BeyondTrust highlights the dangers of hacking back against cyber criminals.
rise of deepfake, nancy pelosi

The rise of “deepfake” technology: Where does it end?

Here, James A. Ingram dives into an ongoing topic of intrigue in modern society: The rise of deepfake technology.
manipulating the uk general election, digital

Are cybercriminals manipulating the UK general election?

Here, David Warburton discusses the potential for manipulating the UK general election in the digital age.
Cyber security in the public sector

Keeping hackers out and costs low: Cyber security in the public sector

Kieran O’Driscoll, Public Sector Business Lead at CyberArk discusses the challenges faced by public sector firms when it comes to balancing cost-effective cyber security with the need to secure the personal details of millions of UK citizens.
rise of cyber-stalking, social media

The rise of cyber-stalking

Ernest Aduwa, Solicitor at specialist criminal defence and civil litigation firm Stokoe Partnership Solicitors, charts the rise of cyber-stalking.
organisational cyber resilience, cyber crime

The human factor in organisational cyber resilience

Here, Dr Sandra Bell discusses organisational cyber resilience and why the human factor is so crucial.
man imprisoned, Nguyen Ngoc Anh

Vietnam: Man imprisoned for making facebook post

Internet censorship in Vietnam is a consistent fear exemplified in the case of Nguyen Ngoc Anh, a man imprisoned for creating a facebook post.
pegasus spyware, whatsapp attacks

WhatsApp attacks: Pegasus spyware hacks 1400 users

WhatsApp have launched a legal case against the NSO group, for hacking the encrypted messaging platform with their Pegasus spyware which roughly impacted 1,400 users.
revenge porn investigation, image based sexual abuse

Pornhub refuse to help police in revenge porn investigation

Recently, Pornhub failed to cooperate with revenge porn investigations by CPS, who are questioning why these images are hosted on their platforms at all.
personal information

The Lancaster University data breach: Safeguarding students personal information

Organisations like universities that handle significant amounts of confidential and personal information are increasingly being targeted by cyber criminals. In this article SecureTeam looks at the damage data breaches are causing in UK universities.
illegal content online

Cybercrime, illegal content online: We don’t have to turn a blind eye

Marsali Hancock from EP3 Foundation underlines that we don’t have to turn a blind eye concerning cybercrime, illegal content and harmful activities online.
CISOs, cloud and cybersecurity

Top five areas of focus for CISOs when it comes to the cloud and...

Chief Information Security Officers (CISOs) have a key role to play in safeguarding the data increasingly stored in the cloud and mitigating cybersecurity threats, while also ensuring compliance with IT regulations, standards, and policies.
civil service email leaks

Why trust at face value can’t fix the civil service email leaks

Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.
Voice Command Virtual Assistant

The Secrets Behind Voice-Command Virtual Assistants

"10 Minutes, I'll Give You The Truth About Smart Speaker and Virtual Assistants". Marsali Hancock of the EP3 Foundation discusses.
cybersecurity in hospitals, hospitals and care centres

Cybersecurity in hospitals and care centres

Dr Peter Leitner and Stela Shiroka, at INTERSPREAD GmbH, detail cybersecurity in hospitals and care centres and their thoughts on the need for increased awareness and enhanced training capabilities in Europe.
political hacktivism, future cyber skills

Political hacktivism: Future cyber skills shortage under the spotlight

34% of the UK public is concerned with the rise in political hacktivism aimed at disrupting democratic processes, such as general elections and referendums.
pegasus spyware, jamal kashoggi

Pegasus spyware: Will the NSO Group change their policies?

NSO Group has been pressured over revelations its invasive Pegasus spyware was used against journalists such as Jamal Kashoggi.

Follow Open Access Government