The FIFA World Cup kicks off in the Luzhniki Stadium in Moscow in a few days time. It will be the biggest sporting event in the world this year, with more than 1.6 million tickets already sold. Fans will be travelling from 32 different countries to the tournament. This would make them a very tempting target for cyber criminals.
If you are a CTO charged with maintaining the security of your organisation’s network, you will already be well aware of phishing attacks. Phishing represents a huge threat to the online security of individuals and organisations alike. In fact research suggests that 95% of all successful cyber-attacks start with phishing.
Given the scale of the threat, combating phishing attacks is one of the priorities of the UK’s National Cyber Security Centre, and they have just published new guidance for organisations on how to protect your organisation against email phishing threats. The guidance is aimed at organisations of all sizes, in all sectors and has been produced in collaboration with CPNI, government, academia and industry.
The first big tech news story of 2018 is a tale that has apparently been ten years in the making. The news just now emerging is that a flaw built into Intel chips, which are vital to almost all PCs and laptops, as well as other technology, makes them vulnerable to the computer’s kernel being hacked.
News has just broken about another high-profile data breach and another Chief Security Officer losing his job as a result. Following on from the firing of the CIO and CSO of Equifax in September, the CSO of Uber, Joe Sullivan, has now been let go after the company was forced to admit to a significant data breach in October 2016.
Malicious cyber attacks are not only rising by the day, but also becoming increasingly sophisticated in nature.
Just a couple of weeks ago Belgian security experts warned that the security protocol used to protect the vast majority of Wi-Fi connections could be broken. This means all modern protected Wi-Fi networks could potentially be exposed to hackers using this new technique to steal sensitive information like credit card numbers, passwords and emails.