Latest

Cyber Security Industry Articles

Latest Cyber Security Information

ARTICLES

Find out the latest information posted about the Cyber Security Industry

THREAT REPORTS

Latest threat reports concerning the
Cyber Security Industry

THREAT INFORMATION

Find out more about what threats are and what to do to protect yourself

Articles

Find out the latest information posed
about the Cyber Security Industry

Threat Reports

Latest threat information posted from the Cyber Security Industry

Growth In Cryptocurrency Scams

Growth In Cryptocurrency Scams

Numerous cryptocurrency scams have emerged since the rising price of some currencies, notably Bitcoin and Ethereum, made them highly lucrative.  These scams have become increasingly common over recent months, but the methods behind them are not new. Some...

Cyber Security of Youth Data

Cyber Security of Youth Data

A Girl Scouts of America branch in Orange County, California, has suffered a security breach potentially exposing the sensitive personally identifiable information (PII) of thousands of minors.  Unidentified hackers were able to log into the email account...

The Insider Threat

The Insider Threat

A recent Court of Appeal case dismissed an appeal against an earlier ruling that the supermarket Morrisons was liable for its employees’ misuse of data. Previously in 2015 a former Morrisons employee had been convicted of leaking employee payroll records. ...

Threat Information

Find out more information about what threats are and what you can do

Cyber Threats from Email

Cyber Threats from Email

If your computer is locked, and you are seeing a “Your computer has been locked” notification from a law enforcement agency then your computer is infected with a piece of malware

Spam & Phishing Scams Protection

Spam & Phishing Scams Protection

Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

Identity Theft Cyber Attack Information

Identity Theft Cyber Attack Information

The number of people falling victim to identity theft in the UK has risen by almost a third, new figures suggest.  The BBC reported on 26th May 2015 that criminals are increasingly using internet forums to buy and sell data.  They use the information to open bank...

Security Threats in Cyber Cafés

Security Threats in Cyber Cafés

No matter how good the security or how much money is thrown at maintaining the integrity of systems, there is a fundamental flaw – people. Indeed, while I have no idea as to the origin of the quote – the reality is that you really are “only as strong as your …

Security Threats from USB Sticks

Security Threats from USB Sticks

The latest craze in computer storage, the thumb-sized USB drive, is so convenient and small that it’s become a fashionable accessory. The drives come on key fobs and in such novelty designs as Lego bricks or sushi. They’re given out at conventions and …

Some worrying Statistics

OVER
 

%

Detected Attacks

and 25% of Large Firms experience a breach at least once per month

 
ONLY
 

%

Suppliers

of all businesses set cyber security standards
for their suppliers

 
 
ONLY
 

%

Have Written

a formal written cyber security policy to protect their business

 
TOOK
 

%

Recommended Action

to identify risks
from Cyber Attacks

 

Stay Safe, Stay Sure, BE SECURE!

Cyber attacks are being performed every second of every day.

You must review your current Cyber defences and continue to have them tested by professional organisations.

 

 

View the NORSE attack map

View Cyber Attacks from NorseCorp

Sign Up for our Latest Posts

Share This

Share This

Share this post with your friends!