Beware of Ticket Scammers on Social Media: Don’t Let Fake Promises Ruin Your Concert Experience

As the excitement builds for Coldplay’s upcoming gigs at Croke Park and fans eagerly await tickets for the much-anticipated Oasis reunion in 2025, the spectre of ticket scammers looms larger than ever. These opportunistic fraudsters are perfectly poised to exploit the fervour of fans desperate to catch their favourite bands live. The Allure of Last-Minute … More Beware of Ticket Scammers on Social Media: Don’t Let Fake Promises Ruin Your Concert Experience

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors. Outdated devices are often easy targets for attackers, especially if they have vulnerabilities that can be exploited and no patches are available due to their end-of-life status. Hacks of outdated or vulnerable devices are an issue, but why would anyone attempt … More Old devices, new dangers: The risks of unsupported IoT tech

That’s how easy it is to hack your phone

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukas demonstrate how easy it is to take over your phone, with some added tips on how to stay secure. Android threats are a serious business. Among them is the Blue Ducky script, which exploits the CVE-2023-45866 Android device vulnerability.  By running … More That’s how easy it is to hack your phone

ESET Research discovers NGate: Android malware, which relays NFC traffic to steal victim’s cash from ATMs

The malware used, which ESET has named NGate, has the unique ability to relay NFC data from victims’ payment cards via a malicious app installed on their Android devices, to the device of a perpetrator waiting at an ATM  ESET researchers uncovered a crimeware campaign that targeted clients at three Czech banks. The primary goal … More ESET Research discovers NGate: Android malware, which relays NFC traffic to steal victim’s cash from ATMs

How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with. Governments create legislation and regulations primarily to protect public interests and keep order, ensuring society functions as it should. When related to cyber insurance … More How regulatory standards and cyber insurance inform each other