Russia’s Putin authorised pro-Trump ‘influence’ campaign, US intelligence says

Russian President Vladimir Putin is likely to have authorised attempts to influence last year’s US election in favour of former President Donald Trump, intelligence officials say. Moscow spread “misleading or unsubstantiated allegations” about the eventual winner, Joe Biden, according to a US government report. But it said no foreign government had compromised the final results. […]

Continue reading


Tsao vs. Captiva – How a US data breach court case could have major impact on the legal definition of ‘harm’

What is Article III standing? In legal parlance, ‘standing’ is the legal right for an individual to bring a claim in court. ‘Article III standing’ refers to the Case or Controversy Clause of the US Constitution (located in Article III, Section 2, Clause 1), which is the basis for many important court decisions addressing standing. […]

Continue reading


Vodafone Calls for New Cybersecurity Policies to Help SMEs

Telecommunications giant Vodafone is calling for the introduction of new cybersecurity policies to help small businesses in the UK recover from the impact of the global health pandemic. In a statement released today, the company asked Boris Johnson’s government to protect small and medium-sized businesses by providing more support to the National Cyber Security Centre and making cybersecurity protections […]

Continue reading


Government briefed on breach of at least 30,000 Microsoft Exchange Servers

Cybersecurity experts briefed government investigators that at least 30,000 Microsoft Exchange Servers have been breached using a chain of vulnerabilities Microsoft patched on Tuesday. The reports, published by independent reporter Brian Krebs and later by Wired’s Andy Greenberg, would confirm a trend SC Media reported earlier in the week, that security investigators were finding substantially […]

Continue reading


The future of cybersecurity will be about ‘fighting fire with fire’

In many ways, cybersecurity has always been a contest; vendors race to develop security products that can identify and mitigate any threats, while cybercriminals aim to develop malware and exploits capable of bypassing protections. With the emergence of artificial intelligence (AI), however, this combative exchange between attackers and defenders is about to become more complex […]

Continue reading