Jul 5, 2016
Between the hours of 5am and 8am Japan time on 15 May last month, cyber attackers used compromised card details of customers from a Tier 1 bank in Africa to make transactions on a number of customer accounts. Well over 100 cyber crooks made physical cash withdrawals...
Jul 1, 2016
Every time the headlines flood with a new story about a breach at a major organisation, the assumption is that the attackers got in due to a high level of sophistication, or through careful studying of their target looking for the weakest link in the security chain....
Jun 29, 2016
To the average user, phishing emails often appear like harmless requests for information, and seem to come from trusted suppliers, and reputable sources. However, for cyber criminals, phishing is more often than not, the easiest way to get a foot in the door of their...
Jun 28, 2016
A recent survey of over 400 global IT security pros revealed that fears over the security of connected devices has risen sharply since last year, writes Peter Reid, executive head of Intervate. In all, 86% of respondents to security analysts Pwnie Express’ survey said...
Jun 28, 2016
The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on copying an out-of-date implementation of the contactless standard to...
Jun 27, 2016
As the world continues to become increasingly connected, organisations are faced with large quantities of data they need to protect and make sense of. International Data Corporation (IDC) predicts that 66% of CEOs will have digital transformation at the centre of...