Oct 30, 2020 | Cloud Consultancy News
The threat intelligence team from GreatHorn uncovered a series of ongoing phishing campaigns targeting users of Microsoft’s Office 365 and Google’s Gmail. The attackers are using imposter open redirector domains and subsidiary domains of various popular brands and...
Oct 29, 2020 | Cloud Consultancy News
Data-scrubbing feature means cookies and site data are wiped from other sites, just not from Google’s own services With users growing increasingly concerned about protecting their privacy online, Google has added a setting to Chrome that allow users to clear...
Oct 28, 2020 | Cloud Consultancy News
A report from global investigations firm Kroll revealed that ransomware attacks were the most observed security threats in 2020, accounting to one-third of all cyberattacks as of September 1, 2020. It highlighted that the impact of rising ransomware attacks on...
Oct 27, 2020 | Cloud Consultancy News
A new research from cybersecurity firm Thycotic revealed that 66% of organizations in Australia are planning to increase their cybersecurity budgets in the next 12 months. The research titled “CISO Decisions” highlighted what motivates companies to invest in...
Oct 26, 2020 | Cloud Consultancy News
Coronavirus-related email subjects remain the biggest threat in phishing scams, according to new research from KnowBe4, a security awareness training and simulated phishing platform. According to the results of the Q3 2020 top-clicked phishing report, phishing tests...
Oct 25, 2020 | Cloud Consultancy News
Mobile network operator O2 has managed to launch its 5G service in more than 100 towns and cities across the UK. The firm said the roll-out is continuing ahead of schedule, with Milton Keynes, Ipswich and Chelmsford now added to the list of areas where 5G has been...
Oct 24, 2020 | Cloud Consultancy News
The repair of a damaged iPhone, assuming you’re not covered by a warranty, can cost you an enormous amount of money. Perhaps that’s not surprising, given the high price you pay for the phone in the first place, but you may be surprised by the repair costs...
Oct 23, 2020 | Cloud Consultancy News
As the pandemic hit, the number of remote workers doubled between mid-March and mid-April, and three-year plans for cloud adoption were compressed into three weeks. To say Covid-19 accelerated the world’s digital transformation is a massive understatement....
Oct 22, 2020 | Cloud Consultancy News
Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth. Office 365 users are receiving emails purporting to come from cryptocurrency platform Coinbase, which ask them to download updated...
Oct 20, 2020 | Cloud Consultancy News
As the Information Age slowly gives way to the Fourth Industrial Revolution, and the rise of IoT and IIoT, on-demand availability of computer system resources, big data and analytics, and cyber attacks aimed at business environments impact on our everyday lives,...
Oct 19, 2020 | Cloud Consultancy News
Zoom has begun a ‘technical preview’ of its end-to-end encryption (E2EE) offering, available for both free and paid users. Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May...
Oct 16, 2020 | Cloud Consultancy News
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world’s most infamous botnets and prolific distributors of malware and ransomware. Trickbot was disrupted through a court order Microsoft obtained as well as technical action...
Oct 15, 2020 | Cloud Consultancy News
It took a little longer than usual, but the iPhone 12 is finally here. And just like we expected, there are four phones this year, with Apple adding a new “mini” model to the lower-end of the lineup. But even with an extra option, the choice of which one to buy might...
Oct 14, 2020 | Cloud Consultancy News
Most people know Zynga as a giant in the Facebook gaming sector. They created several popular Facebook games such as FarmVille, Words with Friends, and Mafia Wars. But in 2019, information of 218 Million users of the app was compromised in a cyber attack. Other...
Oct 13, 2020 | Cloud Consultancy News
As if cyber attacks could not get any worse, there are reports of a first fatality suspected from a cyber attack, a patient in Germany died from delayed treatment allegedly due to ransomware. This and the recent cyber-attack that brought down New Zealand’s stock...
Oct 12, 2020 | Cloud Consultancy News
It’s no surprise that ransomware threat actors have adjusted their attack models to match improvements that organizations’ security defenders are making. But the extent of that shift is eye-opening. As of September 2020, one in four attacks IBM Security X-Force...
Oct 9, 2020 | Cloud Consultancy News
As the economic fallout of the COVID-19 crisis continues to unfold, a research from Next Caller, reveals the pervasive impact that COVID-related fraud has had on Americans, as well as emerging trends that threaten the security of contact centers, as we head towards...
Oct 8, 2020 | Cloud Consultancy News
Your brand is a valuable asset, but it’s also a great attack vector. Threat actors exploit the public’s trust of your brand when they phish under your name or when they counterfeit your products. The problem gets harder because you engage with the world across so many...
Oct 7, 2020 | Cloud Consultancy News
Cybersecurity is the number one technology priority for planned digital transformation projects as businesses adapt to a surge in remote working as a result of COVID-19. Cybersecurity: Main focus for planned projects IT leaders also revealed that adapting culture...
Oct 6, 2020 | Cloud Consultancy News
The benefits of cybersecurity awareness programs are currently the subject of broad discussion, particularly when it comes to phishing simulations. Nowadays, companies not only invest in IT security solutions, but also in the training of their employees with the goal...
Oct 5, 2020 | Cloud Consultancy News
Google has hidden lots of quirky Easter eggs and fun games in its search engine. Below are some of the best, so just head to Google and type one of the following searches. Search: Anagram Did you mean nag a ram? Not exactly. An anagram is a word (or phrase)...
Oct 2, 2020 | Cloud Consultancy News
There’s another clever fraud tactic to add to your library of security threats. Imagine a call or voice message that appears to come from a trusted source but is really a disguised attempt to compromise your identity, credentials or financial information....
Oct 1, 2020 | Cloud Consultancy News
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option. This is according to the...