News

Subscribe

Contributors

About

4IQ powers Cyber Intelligence Centers for defense and law enforcement agencies and provides enterprises with Intelligence Services that monitor open, social, deep and dark web sources to detect stolen credentials and data breaches, investigate adversaries, assess threat levels, conduct due diligence and counter terrorism, hacktivism, organized crime and unfair competition.

Contact

Statistics

Posts: 161
Reposts: 0

0 2 10

4iQ is the best cyber security startup in Spain

Spain has a long and illustrious history of creating high tech cyber security startups. The local publication "Actualidad Economica" has...

Read More…
unknownx500

0 0 3

Unprotected web applications the well-known problem

It is surprising that we have not solved this problem nowadays, this is an old problem that almost every security expert knows but as we...

Read More…
unknownx500

0 1 7

How can tax software cause such cyber-damage?

As more details emerge of the damage done by the recent Petya attack, experts are pointing the finger at the MEDoc tax-filing software....

Read More…
unknownx500

0 0 3

Seventy five percent of UK companies suffer DNS attacks

DNS is the unsung hero of the internet age and yet gets very little attention, particularly with respect to cyber security. Is it time to...

Read More…
unknownx500

0 0 11

Data has become our lifeline - Petya wreaks havoc

Last year ransomeware grew 167 times the level of the year before... looks like this year will set new records.. 

The attack should not have been a shock. As data has become our lifeline, cybercriminals have elevated their game and their demands. Just...…

Read More…
unknownx500

0 0 3

Petya ransomware attack strikes European companies

Major companies in the Ukraine are reporting  a significant cyber-attack, as companies in France and Russia also appear to be affected. ...

Read More…
unknownx500

2 1 6

Cyber Security Threats: How hackers Hacked the World's Most Powerful People @Newsweek

The U.K. Parliament became the latest Western government to be targeted in a cyber attack Friday. Parliamentary officials said the attack...

Read More…
unknownx500

1 1 5

Anthem to pay $115M to settle 2015 data breach

Target breach started with a password stealing bot, Home Depot breach started with credentials stolen from a third party vendor, Anthem...

Read More…
unknownx500

0 2 1

Virgin Media SuperHub 2 modems at risk of password hacking

Consumer website Which? is reporting that Virgin Media's Super Hub 2 modems are at risk of being hacked through insecure passwords. Up to...

Read More…
unknownx500

0 0 1

RNC Breach - cost of not treating Data as IP

Great quote "Until we start treating data the same way we do intellectual property, we’re going to continue to see this, where people see...

Read More…

0 3 1

Should you pay a ransomware demand?

As more companies are being successfully targeted with ransomware attacks, should they pay up and risk fuelling the crime? Do they have a...

Read More…
unknownx500

0 0 2

Is the UK ready for GDPR compliance legislation?

A new report by Sophos has found that 54% of UK businesses have little to no understanding of the fines they might incur under the new...

Read More…
unknownx500

0 0 2

How to make the most of two-factor authentication

Given the rapid increase in data breaches, most likely some of your account passwords have already been stolen. Two-factor authentication...

Read More…
unknownx500

0 0 8

SMB exposure post-wannaCry

WannaCry has changed our lives, if we have learned something after this ransomware attack is that we have to keep our software...

Read More…
unknownx500

0 0 0

Blockchain

So it already started...keeping the data secure so that in case it is stolen, it is useless to the hackers....

Won't be surprised if IAM...

Read More…
unknownx500

0 0 5

Spam botnets

The number of affected devices is strikingly high, but the worst thing is that most of them or even worse none of them know that they are...

Read More…
unknownx500 Visual Content

0 0 3

Is your Mac as safe as you thought?

Any Mac user will say that one of the attractions is that Mac's are immune from hackers. Was this ever really true and have Mac users...

Read More…
unknownx500

0 1 0

The 15 worst data security breaches

Safeguarding passwords will help. Keeping different passwords for different portals, based on the criticality of the web site (social...

Read More…
unknownx500

0 0 0

Don't believe your own hype

Hubris and confidence about self (individual, product, company) - a very thin line to manage.

We’re all about saying things that sound both plausible and very impressive or things that make us sound really smart and full of...…

Read More…
unknownx500

0 0 0

Social Media and click fraud

Makes one wonder what amount of breached identity data is real and not just noise created by the bots.

A significant portion of internet traffic isn't real. It's perpetuated by bots, fake accounts set up to artificially inflate the...…

Read More…
unknownx500

0 0 5

The cost of cybercrime

That cybercrime has a cost is nothing new, what is remarkable from my point of view is that it is rising every year and what it is even...

Read More…
unknownx500

0 0 1

How to protect our sensitive information

On the one hand there are billions of stolen credentials, on the other hand, on average people reuse the password 4 times, if we combine...

Read More…

0 0 0

The importance of having a good plan

“There are only two types of companies: Those that have been hacked and those that will be hacked.” Robert S. Mueller, Director FBI made...

Read More…

0 0 10

A new trick to hack and control your Gmail accounts

Since the phishing emerged in the mid-90s it has evolved a lot, nowadays, unfortunately, all of us are familiar with the term. Gmail...

Read More…
unknownx500

0 0 9

Unsecured Database Exposes 10 Million Car VINs

Exposed credentials by cyber criminals represent the most important threat to internet users nevertheless data breaches exposing another...

Read More…
unknownx500

0 0 0

Android Apps with Malware

Mobile Cybersecurity - that will become bigger then the regular online Cybersecurity, since all of us practical live off our mobile devices.

Read More…
unknownx500

0 0 0

Cybersecurity and Blockchain

What happens to any stolen or breached data - if it is well protected using some encryption?

We need to start thinking about breached data...

Read More…
unknownx500

1 1 0

Autonomous vehicles and Hacking

With the ability to hack the vehicles remotely or locally - this will become another frontier for Cyber Security companies to provide...

Read More…
unknownx500

1 2 0

GDPR and your data

Worth reading if you are in the business of storing customer data.

This blog is going to simplify and demystify GDPR.

unknownx500

2 1 0

GDPR Demystified - Best Summary

This is a Blog Entry from HyTrust - a Trident Capital portfolio company - that provide one of the best GDPR Summaries available.

The...

Read More…
unknownx500

0 0 0

Chat Apps as Malware C&C

Given that many Enterprise organization uses these tools for their internal communication - and to share many sensitive piece of...

Read More…
unknownx500

0 1 4

See you at Infosec London 2017!

It's that time of year when the security world gathers in London to show of the latest solutions for tackling cybercrime. Once again more...

Read More…
unknownx500

3 2 7

4iQ and Cyber Risk Assessment at Instech London

4iQ powers cyber risk intelligence centres for defence departments, law enforcement agencies, physical security service providers,...

Read More…
unknownx500

0 1 3

Payment system security fears

Anyone who remembers the early days of credit cards will be familiar with the feeling of not trusting a new form of payment.

A survey conducted by new data global law firm Paul Hastings reveals fears British consumers have when using new payment methods. ...…

Read More…
unknownx500

0 0 0

Infosec London 2017

Have a great conference Richard!

I am hoping we will get some traction on 4iQ front with the right vendors at the venue.


It's that time of year when the security world gathers in London to show of the latest solutions for tackling cybercrime. Once again more...…

Read More…
unknownx500

0 0 2

OneLogin password manager exposed

What happens when a trusted password manager has its data breached and how should its users react? Data breaches are now more common than...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.