fbpx

Latest cybersecurity publications


Tackling network security during the 2019 Rugby World Cup

It’s Rugby World Cup time in Japan, with the first round of rugby union’s most elite competition kicking off over the weekend. During the next few weeks, thousands of fans will travel far and wide across the country to soak up the action. In addition to bringing bundles of optimism about their teams’ prospects, die-hard supporters will arrive armed with a legion of connected devices.


Monzo admits storing 480,000 PINs as plain text in log files

Monzo claims no one outside the challenger bank had access to PINs Monzo has advised almost half a million customers to change their PIN after the British online-only bank discovered it was storing their codes as plain text in log files. The bank said that the PINs were stored in a log file accessible to… Read More


Capital One breach affecting 106 million customers caused by misconfigured cloud storage

Scores of personal information including social security numbers, credit scores and balances were sitting on Github for weeks A hacker gained access to personal information from more than 100 million Capital One credit applications in the US, the bank said as US federal authorities arrested a suspect in the case. Paige A Thompson – who… Read More


Man arrested over Lancaster University cyber attack

Records and ID documents of some students were accessed in the phishing attack A man has been arrested after student data was stolen in a cyber attack on a university. The 25-year-old man from Bradford was arrested on suspicion of Computer Misuse Act (CMA) and fraud offences on Monday following the breach of Lancaster University… Read More


3 ways to secure your business against future cyber threats
Ahead of his presentation at Cloud Expo Asia in Singapore, Steve Ng, Lead, digital platform operations at Mediacorp Singapore, explains how organisations can prime themselves for evolving cyber threats Cyber security is a challenging field with a broad spectrum of technologies, threats, processes and zero-day exploits, one where both good and bad actors are searching... Read More


Do NOT follow this link or you will be banned from the site!