James Hughes
James Hughes is an IT Professional who specializes in computer networking and cyber security. He has vast experience in IT audit, compliance, and computer server and database management. James taps his wide knowledge of IT processes including security incident management and response, vulnerability assessment, disaster recovery, and data loss prevention to educate business through writing.
-
Tech Companies Face Tough Regulation as UK Enforces the Online Safety Act
The British government has commenced implementation of the UK Online Safety Act. The new law requires tech companies to take more action in combating illegal content online. According to CNBC, this paves the way for the ... -
FBI Issues Urgent Warning for iPhone and Android Users to Secure Messaging Apps
In a recently released advisory report, the FBI has warned iPhone and Android phone users about security loopholes in instant messaging applications including WhatsApp, Facebook Messenger, and Signal. According to Forbes... -
UK Regulators Issue Conditional Approval for Vodafone-Three Merger
The UK Competition and Markets Authority (CMA) has approved the longstanding merger between Vodafone and Three. According to TechCrunch, the Vodafone-Three merger brings together two of the UK’s largest telecommuni... -
The Chinese Raise Alarm over Safety of US Chips as China-US Trade Wars Intensify
Chinese chip manufacturing associations have raised alarm over the reliability and safety of US chips. According to Reuters, the associations urged Chinese companies to purchase locally manufactured chips in response to ... -
US Agency Proposes New Rules to Curb Sale of Customer’s Personal Data
US watchdog, Consumer Financial Protection Bureau (CFPB) has proposed new rules under the Fair Credit Reporting Act (FCRA). According to TechCrunch, the new rules are intended to bar data brokers from selling financial o... -
Trump’s FCC Pick Hints at Massive Changes for US Big Techs
Trump’s FCC pick Brendan Carr has said that US big techs may have to identify strategies for defending themselves against the incoming Federal Communications Commission. According to Yahoo Finance, Carr said this soon ... -
Big Techs Criticize Australia For Rushing the New Social Media Ban Law
Australia has become the first country to ban social media for children below the age of 16. Australia’s ban on social media sends a strong message to big techs about the need to tighten security on their platforms, as... -
Cyberattacks Cost UK Businesses $55 Billion Over 5 Years, New Research Shows
Latest research shows that UK businesses have lost over $55.08 billion to cybercrime over the last five years. Research from Howden shows that cyberattacks on UK businesses mostly target businesses whose annual revenue e... -
Instagram’s New Update to Give Users More Control Over Content Recommendations
Instagram has started testing a new feature that will allow users to reset content that others recommend to them. The Verge reported that with Instagram’s new update, users will be able to clear algorithmic content tha... -
U.S. Election Cybersecurity Pushes Back Against Unprecedented Foreign Interference
As the 2024 U.S. presidential elections approach, concerns over election security and U.S. cybersecurity have intensified, with officials working to counter misinformation and potential cyber threats. According to Reuter... -
Brazil Sues Social Media Platforms, TikTok and Meta for Minor Safety Lapses
A Brazilian consumer rights group known as Collective Defense Institute has filed two lawsuits against Tiktok, Meta Platforms, and Kwai. Reuters reported that Brazil sued the social media platforms for failing to prevent... -
13 States Across the US Sue TikTok for Teen Mental Health Harm
Chinese social media giant, TikTok is facing a series of new lawsuits across 13 states and Washington DC in the US. States in the US sued TikTok on October 8, 2024, accusing it of failing to protect young people and harm... -
Chinese Hackers to Blame for US Court Wiretap Break, WSJ Reports
Chinese hackers breached US broadband provider networks in a cyberattack associated with the Chinese government. A Wall Street Journal report published on October 5 showed that the US Court wiretap systems attack targete... -
Verizon Network Issue Resolved As People Speculate the Cause
The massive outage that left thousands of Americans without mobile phone network on Monday has raised concerns about what caused the disruption. On Tuesday, October 1, 2024, the company said the Verizon network issue had... -
Kaspersky’s Forced Antivirus Updates Leave US Customers in Disarray
Automatic antivirus updates by Kaspersky have left many US users thinking their computers have been breached. The Kaspersky forced updates entailed automatic replacement of the antivirus with UltraVPN and UltraAV. Earlie... -
TikTok Ban Appeal in the US Commences
TikTok has commenced its appeal against the US government over the divest or ban law. According to the Independent, the TikTok ban appeal in the US was triggered by commencement of this law in April this year. The new la... -
Cybercriminals Steal Personal Data from Avis
US car rental company, Avis, has announced that personal information and driving license numbers belonging to hundreds of thousands of customers have been stolen. TechCrunch reported that the information was stolen durin... -
Cyberattack Disrupts Chip Production at Microchip Technology
US chip manufacturer Microchip Technology has reported a cyberattack. The Microchip hit by cybercriminals compromised servers, forcing the company to shut some of its systems and reduce operations. Microchip Technology s... -
Kaspersky Set to Exit US Market After Government Ban
Cybersecurity firm Kaspersky is set to wind up operations in the US and lay off US-based staff. Kaspersky shutdown has been occasioned by the Department of Commerce decision to ban the Russian firm from marketing and sel... -
OpenAI Hacked by ‘Private Individual’, Could China Be Next?
Over a year ago, OpenAI was hacked and its staff discussion forum was breached. Last week, the New York Times reported that the hacker stole details about the company’s AI technologies. However, OpenAI didn’t go publ... -
The A to Z of Cloud Security Solutions for Businesses
Introduction In the world of cybersecurity, nothing is more baffling than cloud security solutions. These solutions collectively make up technologies, policies, and controls that protect data, applications, and infrastru... -
Finance Professionals Targeted with Deep Fake Fraud Scams
About 53% of finance professionals in the US and UK have been targeted by deep fake fraud scams. According to Yahoo Finance, data from Medius shows that 43% of those targeted fell victim to the attack. Medius is a top ac... -
pcTattletale Data Breach Causes Spyware Maker to Close Down
US spyware maker, pcTattletale has closed shop days after it experienced a data breach. According to Techcrunch, the spyware company Founder, Bryan Fleming said the company had gone out of business and was completely don... -
How to Secure Your Cloud Native Applications in 2024
Introduction In a world where the technology landscape is constantly changing, the cloud-native concept has gained traction. Although mostly associated with migrating data to the cloud, cloud-native is also about leverag... -
Distributed Ledger Technology: A Comprehensive Overview
Introduction If you’ve been following cryptocurrencies and blockchain, you’ve heard about distributed ledger technology (DLT). Although the idea of distributed computing isn’t entirely new, the execution of distrib... -
Build Cyber Resilience Strategies for your Organization
Introduction In today’s highly interconnected world, organizations are constantly facing cyber threats. Statistics from Marsh show that globally, 75% of businesses have experienced a cyber attack at one time or another... -
Top 10 Strategies to Ensure GDPR Compliance Across Industries
Introduction In May 2018, the General Data Protection Regulation (GDPR) took effect in the European Union. This law was enacted to curb widespread data breaches that exposed personal data, putting the security and trust ... -
Security Assessment: How Automated Assessments are Transforming Risk Management
What is Automated Security Risk Management Definition of Automated Security Risk Management and its Importance Automated risk management is becoming increasingly important in today’s fast-paced and constantly evolving ... -
10 Types of Cyber Attacks Commonly Used by Hackers
Introduction Technology is the norm today as most individuals use computers and the internet. The dependence on digital products has led to an increase in unlawful and malicious computer activities. Exploiting computer s... -
Best Floodlight Camera to Buy
Introduction You heard a shuffling noise but you don’t want to go look. In this case, a security camera with good night vision will show you what’s out there. But if you want to scare that rascal or raccoon away then... -
Top 5 Zoom Security and Privacy Tips
Introduction We saw a huge lock-down around the world due to the coronavirus pandemic. And as the world stopped, we continued to stay online for more and more hours. For instance, Statista says that the coronavirus o... -
BYOD Policy Helps, but Only With Cyber Security in Place
Introduction These days, mobile phones have become vastly popular across the globe. In 2019, worldwide smartphone penetration was 65%, and it is predicted to reach approximately 80% by 2025. The reducing prices of these ... -
Top 10 Cyber Security Tools To Look Out For In 2022
Introduction Recent technological developments have made cybersecurity something that every business needs to take seriously. Additionally, with ever-rising numbers of cyber-attacks, it has become crucial for businesses ... -
IT Security With Multi-Cloud Technology
Introduction As more and more companies leverage multi-cloud technology to improve IT operations, cloud archives and try to provide better services to their customers, they simply cannot afford to overlook the implicatio... -
8 Security Tips For Protecting Your Data While Working Remotely
Introduction COVID-19 pandemic outbreak has halted the economic activities of the world. While most of the countries are under lockdown, companies are encouraging their employees to work from home to keep businesses up. ... -
Zoom To Encrypt End-To-End Encryption Only For Paying Customers FBI Access To Calls
Introduction Zoom video calling apps has boomed during the time of the pandemic. Zoom making its way on the of Android and iOS app stores as all the social interactions shifts online including office conferences to frien...