The Importance of Vulnerability Scanning with AppCheck

Why Regular Vulnerability Scanning is Important Why Conduct Vulnerability Scans? Every year, Verizon Communications Inc, a multinational telecommunications conglomerate, publishes a report known as the Verizon Data Breach Investigations Report. The report compiles data from over 40,000 security incidents within the last 12 months experienced in a range of public and private sector organisations and uses it to […]

Read More

CyberWhite’s Seven Questions With – Steven Hope, Authlogics

Steven Hope Interview – Authlogics Join us in the first of our ‘7 Questions With…..’ series as we sit down with key people in and around the cybersecurity industry.  We’ll find out what drives them in the pursuit of making people and organisations more secure in the cybershere and what makes them different. First up […]

Read More

Are palm prints more secure than fingerprints?

With the news that Amazon has launched its own palm scanning technology that allows its customers to buy items with their palm print by way of biometric scanning, we asked our own Chief Technology Officer at CyberWhite, David Horn his thoughts on palm scanning technology. Palm recognition according to Amazon, is designed to be highly […]

Read More

The End of the “Golden Era” of Dark Web Marketplaces

On 22 Sep 2020, a joint international operation resulted in 179 individuals’ arrest and the seizures of USD 6.5 million and 500 kilograms of illicit substances. The successful outcome of Operation DisrupTor (pause for appreciation of the operation name) elicited some strong words from the head of Europol’s European Cybercrime Centre (EC3). According to the […]

Read More

QR Codes: A Security Threat

With the advent of the NHS Track and Trace app, now more than ever many of us are scanning QR codes. So, what do we need to watch out for, and how can you protect yourself from malicious versions of these mobile shortcuts? If it seems like QR codes have popped up everywhere these days, you’re right. Ever since they […]

Read More

Have You Ever Received an Email from Your Own Email ID?

What is Email Spoofing? According to Forbes magazine, scammers send 3.1 billion domain spoofing emails every day. Moreover, to carry out these email scams, cyber criminals impersonate a company, an organisation, or a friend to trick users. The motive behind these scams is to convince users to divulge sensitive information, login credentials or financial information. This fraud strategy of creating a forged sender […]

Read More

Cyber Security Firm’s Post-Lockdown Growth

CyberWhite, a cyber security firm based in Seaham, is bucking the trend by expanding its workforce following lockdown, at a time when other businesses are considering reducing staffing levels. The firm has remained busy throughout lockdown due to the increase in cybersecurity threats during the coronavirus crisis and businesses needing support to ensure their systems […]

Read More