Quick – name a security risk to your business that represents over half of security attacks. Did you think “people inside my business?” Probably not. Yet the 2015 IBM Cyber Security Intelligence Index found that over half of security attacks came from within: 31.5 per cent from malicious insiders and…
Android Pay is coming within weeks according to teaser
Android Pay, the mobile payment system available to Android users, is just weeks away from launching according to a teaser found by opening the Google Wallet app from the Google Play Store. The teaser says that in the next few weeks, Google Wallet will be re-branded as Android Pay and…
Cybersecurity: Tackling the threat from within
Source: National Cyber Security – Produced By Gregory Evans The firewalls, anti-virus software, mail-filters and other digital defences used across the business world are generally looking for external threats. But what if the bad guys are on the inside? What if your own employees are seeking to defraud your company…
Beauty from within: transgender model Carmen Carrera
Being a woman is hard work. You are constantly being scrutinized and pressured to the extremities of beauty. For most women the pressure to be utterly stunning is too much to take, but for Carmen Carrera, the need for a female body triumphs all. Being a woman myself, I don’t…
Beauty from within: Carmen Carrera
Being a woman is hard work. You are constantly being scrutinized and pressured to the extremities of beauty. For most women the pressure to be utterly stunning is too much to take, but for Carmen Carrera, the need for a female body triumphs all. Being a woman myself, I don’t…
New Legislation Passed to Keep the Russian’s Data Within Borders
The Russia’s parliament has taken a step for its citizens to secure their data. The legislation has been presented in the Parliament in which the internet companies will be restricted to keep the data of the Russian users within the country’s premises. Read More…. For more information go to http://www.NationalCyberSecurity.com,…
Data breach within Lowe’s
Sometimes, it gets more serious than the breach issue. Lowe’s faced this problem when its third-party enterprise mistakenly uploaded the data of its employees to an unprotected server. The backup file was full of the personal details of Lowe’s employee. The details included addresses, birth dates, names, driver’s licenses number,…
Cyber Security in South Korea: The Threat Within
Since the first large scale distributed denial-of-service (DDoS) attack in July 2009, the South Korean government has consistently accused North Korea of being the culprit behind other incidents. Specifically, it cites as responsible a hacking and cyber-warfare unit established in 2009 at the Reconnaissance General Bureau of the North Korean National Defense Commission….
Enemy Within: Israeli Army in cyber war against skeletons in closet
Massive leaks of secret files have recently been shaking many governments, and Israel is no exception. But for the nation’s army, the problem appears to come from its own ranks – with sodiers posting secrets on social networks. Paula Slier looks at the Israel Defence Force’s struggle to keep its…
SIA report predicts Brazilian security market will triple within five years
Top Priority Sector: access_control_identification The Security Industry Association (SIA) on August 2 released the most updated and comprehensive resource available on the electronic physical security market in Brazil, the 2012 Brazil Security Market Report. Both the public and private sectors in Brazil are investing heavily in security equipment, as that…