cybersecurity stories

Round-up: Cybersecurity stories tearing up the internet this March

29/03/20183 Minute Read

From millions of malware-infected mobile devices to the biggest DDoS attack ever, here are the news stories that have stormed the internet this month.

Young Brits ‘lack cyber-security awareness’

It’s been revealed that young Brits lack basic cybersecurity awareness and, when we say basic, we mean it – more than half of 18-25 year olds use the same password for online services. This means that when they share sensitive data, they are vulnerable to hackers. It seems our young generation are in need of urgent cybersecurity 101.

Source: BBC News

BOOM! Cambridge Analytica explodes following extraordinary TV expose

During an undercover investigation by Channel 4, senior executives from data analytics firm, Cambridge Analytica were shown on camera boasting about their dodgy data tactics, from honey traps to fake news. Given this data analytics firm worked on Donald Trump’s election team and the winning Brexit campaign – this is one news story that is far from finished.

Source: The Register

Pre-Installed Malware Found On 5 Million Popular Android Phones

Security researchers have discovered pre-installed malware, dubbed RottenSys, on 5 million mobile devices worldwide. Disguised as a System Wi-Fi Service, the malware works by displaying ads on a device’s home-screen in an attempt to generate fraudulent ad-revenues. But, this is the least of users’ worries; attackers have the ability to take full control over these infected devices.

Source: The Hacker News

Cyber attacks are one of the biggest threats that schools face, experts warn

With an abundance of teacher, parent and pupil data, schools are a goldmine for hackers – and an easily accessible one at that, as staff are often ill-equipped to deal with them. Because of this, experts have warned that cyber-attacks are now one of the biggest threats faced by schools and have called for more to be done to protect the education system – not just by officials but, by everyone.

Source: The Telegraph

Hackers learn to hurdle two-factor authentication

To safeguard users, cybersecurity experts are urging them to add a second layer of authentication to their accounts. However, by spoofing SIM cards, intercepting unencrypted message and stealing data from telecoms operators, hackers can jump this security hurdle with worrying ease. Hopefully, a third layer will prove more effective and prove it really is a magic number.

Source: The Financial Times

GitHub survived the biggest DDoS attack ever recorded

Earlier this month, 1.35 terabits per second of traffic hit the developer platform GitHub all at once; the most powerful Distributed Denial of Service (DDoS) recorded to date. Amazingly – it survived. Within 10 minutes, the platform had called for service back-up, which immediately got to work by routing all traffic and blocking all malicious activity. The attackers eventually waved a white flag but, GitHub and other large organisations are not in the clear yet – it’s only a matter of time before another DDoS of this scale is reattempted.

Source: Wired

With our monthly round-ups, you’ll never be out of the loop when it comes to the top cybersecurity news stories. Check out the headlines that took February by storm here.

So, what does April have in store for technology? Stay tuned to find out.

Howard Roberts 12/04/2018 5 Minute Read

How to secure your network from its weakest component: people

HP’s EMEA Print Technologist Howard Roberts explains how simple oversights like not updating and patching can lead to huge problems with company security polic…

Howard Roberts 04/04/2018 5 Minute Read

What is endpoint security and why a Firewall is not enough

We explain endpoint security's biggest challenges, and why a Firewall is not enough, with the help of HP's EMEA Print Technologist Howard Roberts.

Jasmine W. Gordon 27/03/2018 5 Minute Read

Dear CIOs: It’s time to get your board psyched about IT

CIOs are finding it hard to energise their board about office tech as something the future of their department depends on. So, how do they do it?

Leave a Comment

Your email address will not be published. Required fields are marked *