News 2019 NovemberBlackFog partners with MustekChannelwise, Nov 1, 2019Mustek wins BlackFog distribution rightsITWeb, Nov 1, 2019OctoberBlackFog Partners with MustekIT-Online, October 31, 2019AugustAre smart cities a disaster waiting to happen?IT Pro, August 21, 2019Global Data Privacy Software Market by Key Players, Regions, Type and Application, Forecast to 2024Orbis Research, August 21, 2019July Is it safe to use airport wifi? The Times, July 20, 2019 What kind of cybersecurity threats does 5G pose?Silicon Republic, July 18, 2019 25 Million Android Phones Infected With Fake AppsSilicon, July 11, 2019 Experts Views On ICO Fines For BA And MarriottInformation Security Buzz , July 10, 2019 Powershell protection tips from BlackFogBuzzfone , July 9, 2019 Experts Views On British Airways Faces Record £183m FineInformation Security Buzz , July 8, 2019June Battling state-sponsored cyber warfare with modern cybersecurity methods Verdict , June 21, 2019 Expert Comment: Russia & US Power Grid Cyberwar Information Security Buzz, June 18, 2019 Asco breaks silence on ransomware attack Computer Weekly , June 17, 2019 Experts comment on US Customs data breach Security Brief , June 12, 2019 Customs and Border Protection breach shows need to monitor contractor cybersecurity Verdict, June 11, 2019 US Border Agency Says Travellers’ Images Stolen By Hackers – Commentary Information Security Buzz, June 11, 2019 UK ‘Particularly Vulnerable’ To Cyber Attack, MPs Warn Silicon, June 6, 2019Smartphones – should we trust them as much as we do? SC Magazine, June 3, 2019MayUnderstanding Modern Cybersecurity AnatomyIT Security Guru, May 31, 2019Understanding Modern Cybersecurity AnatomyInfosec Voices, May 30, 2019Users’ names and email addresses leaked in Flipboard data breachSecurity Brief, May 30, 2019Protecting Against Cryptocurrency MiningTechNative, May 30, 2019GDPR one year on — what has changed?Verdict, May 28, 2019Vodacom conclut un partenariat avec BlackFog en matière de cybersécuritéDigital Business Africa, May 17, 2019BlackFog partners with Vodacom SA – To provide cybersecurity and privacy to more than 43 million customersSME Tech Guru, May 17, 2019Vodacom Business inks partnership deal with BlackFogTelecompaper, May 17, 2019Vodacom provides new cybersecurity solution to usersMybroadband, May 16, 2019Vodacom taps BlackFog to handle cybersecurity for its 43 million customersHypertext, May 16, 2019Vodacom partners with BlackFog to provide cybersecurity solutions to its customersAfrica Tech, May 16, 2019Vodacom enters cyber security partnership with BlackFogIT News Africa, May 16, 2019Vodacom secures customers with BlackFogIT Online, May 16, 2019WhatsApp Vulnerability Exploited To Install SpywareInformation Security Buzz, May 14, 2019Does the UK actually need a cyber security ambassador?SC Magazine, May 2, 2019AprilCyber criminals increase use of fileless attacksComputer Weekly, April 30, 2019Aebi Schmidt latest manufacturer dealing with cyberattackSC Magazine, April 25, 2019NSA Releases Security Research Tool, But Can You Trust It?InCyberDefense, April 23, 2019Facebook Uploaded 1.5 Million Email ContactsSilicon, April 18, 2019Behavioural profilingProfessional Security Magazine Online, April 18, 2019Wipro breach commentsInformation Security Buzz, April 17, 2019Wipro hacked & piggy-backed to target customers, highlights outsourcing risksSC Magazine, April 17, 2019Victims fooled by legitimate signup forms in phishing scamSC Magazine, April 10, 2019You can’t stop them from getting in, but you can stop them getting outIT Pro Portal, April 5, 2019MarchHow ASUS Software Updates installed backdoorsInformation Security Buzz, March 26, 2019How ShadowHammer affected over 1 million usersSC Magazine, March 25, 2019Discussion on how your employees may be your weakest linkProfessional Security Magazine Online, March 21, 2019Interview with Dr. Williams about cyber espionage and the data exfiltration threat.Computer Weekly, March 12, 2019Can we trust the NSA Security Research Tool?Forbes, March 7, 2019FebruaryNew Malware can be triggered by previewing documentsInformation Security Buzz, February 21, 2019Why Privacy is more important than ever in 2019IT Pro Portal, February 20, 2019Online photography network breach affects millions of usersInformation Security Buzz, February 14, 2019How the VFEMail hack destroyed nearly 20 years of dataSC Magazine, February 13, 2019Australian government cyber-attack attemptInformation Security Buzz, February 11, 2019Protecting Intellectual Property by blocking data exfiltrationInformation Age, February 11, 2019What is cryptojacking and what you can use to defend yourselfComputer Business Review (CBR), February 4, 2019How the Kwik-Fit cyber-attack affects trustInfoSecurity Magazine, February 1, 2019JanuaryData Privacy Day 2019 and why it is more important than everData Centre Review, January 31, 2019The impact of the Kwik Fit data breach on customers and what you should doForbes Magazine, January 31, 2019How GDPR has impacted Data PrivacyIntelligent CISO, January 28, 2019Comments about the collection 1 data breach Intelligent CIO, January 18, 2019The anatomy of cybersecuritySC Magazine, January 18, 2019Cryptocurrency mining economics and protectionIT Security Guru, January 14, 2019How to protect yourself from Cryptocurrency miningProfessional Security Magazine Online, January 8, 2019 Darren Williams2024-10-14T18:51:43+01:00January 1st, 2019|News| Share This Story, Choose Your Platform! FacebookXLinkedInEmail Related Posts News 2024 Gallery News 2024 News 2023 Gallery News 2023 News 2022 Gallery News 2022 News 2021 Gallery News 2021 News 2020 Gallery News 2020