This post has been provided courtesy of ICA
How some websites are using a combination of crowd sourcing, Cloud services and Internet marketing techniques to sell illegal system access and other criminal cyber services online. Gone are the days when ideologically motivated hackers, wearing ponytails and sandals, tapped …
A Jumbo Jet only travels fifty times faster than a horse and buggy. A modern computer processes data thousands or millions of times faster than its own forebears. In fact, Quadrillions of times faster in at least one case. Meanwhile, …
I recently delivered a presentation in Stockholm to corporate staff on the risks arising from poor social media use. During the Q&A I was asked about guidance for parents and teachers in relation to child online activities. The audience, drawn …
TRMG has been working with Legal and General to produce that firm’s Digital Criminal 2012: CyberSafety report. One of the report’s key findings is that criminals are targeting social media users online by setting up fake profiles, ‘friending’ potential targets …