Should weak passwords be banned?

Should weak passwords be banned?

Are you one of the millions of people still using “123456” as their password? According to password management company, NordPass, this has been used more than 4.5m times, and it takes less than 20 seconds to crack. But, in the UK, weak passwords will soon be a thing...
Social engineering hides a backdoor in plain site

Social engineering hides a backdoor in plain site

A recent incident where a backdoor was introduced into XZ Utils’ open-source software in plain sight shows how effectively malicious actors can use social engineering for their own gains.  What is XZ Utils? XZ Utils is a set of free software command-line lossless data...
8 Cybersecurity predictions for 2024

8 Cybersecurity predictions for 2024

Global technology research and consulting firm, Gartner, recently revealed their top eight cybersecurity predictions for the next few years. The way companies hire cybersecurity workers will change over the next few years as the adoption of generative AI will close...
Cybercrime in the manufacturing sector

Cybercrime in the manufacturing sector

One of the most targeted sectors for cybercrime globally is manufacturing. In 2023, it was the industry with the highest share of cyberattacks, encountering around 25% of the worldwide total. Of these, malware and ransomware were the top types of attack. The average...
End-to-end encryption: How secure is it?

End-to-end encryption: How secure is it?

As a security feature that comes with many messaging apps and data sharing software, end-to-end encryption is a way of making sure your communications and data is protected. However, is it as secure as we believe? What is end-to-end encryption? End-to-end encryption...
Will quantum computing be a threat to cybersecurity?

Will quantum computing be a threat to cybersecurity?

As developments in quantum computing lead to greater computing power, many are concerned about its potential impact on cybersecurity. Whilst it will bring benefits, such as identifying and shutting down cyber attacks more quickly, the negative consequences could be...