Search Results
Edit Save
564 results
Graham Cluley - Blog 04/18/2019 06:57
The hacker who lived the high life after spreading malware via porn sites, Wipro demonstrates how to turn a cybersecurity crisis into a PR disaster, and why are humans listening in to your Alexa conversations? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Brian Honan.
Graham Cluley - Blog 04/16/2019 04:30
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! At Recorded Future, we believe every security team can benefit from threat intelligence. That’s why we’ve published “The Threat Intelligence Handbook.” It’s aimed at helping security professionals realize the advantages of threat […]
Graham Cluley - Blog 04/10/2019 17:43
Stalkerware. Software that allows someone else to spy upon every SMS text message you send or receive, who you’re speaking to on your smartphone phone, the pictures in your photo library, every social media post you make, your current location, and where you go and when. The EFF’s Eva Galperin calls on the security industry to take stalkerware more seriously.
Graham Cluley - Blog 04/07/2019 05:59
Graham Cluley Security News is sponsored this week by the folks at CloudShare . Thanks to the great team there for their support! As cyber hacks, ransomware, and other breaches continue to rise, companies are quickly realizing the need for increasing their cybersecurity staff. Current data however indicates that the cybersecurity manpower shortage continues to grow, with over 1,000,000 cybersecurity positions unfilled in the U.S. alone. The relationship between this shortage of cyber security skills and hacking exposure can’t be ignored, with many companies feeling that their lack of employees with cybersecurity skills make for more desirable targets for cyber criminals. It’s imperative therefore that these employees are sufficiently traine.
Graham Cluley - Blog 04/01/2019 06:04
Graham Cluley Security News is sponsored this week by the folks at SafeToGo Solutions . Thanks to the great team there for their support! It doesn’t matter how big or small your business, or what industry you operate in, data breaches pose a real threat to all of us. In addition to monetary fines, a data breach can result in long-term reputational damage, business disruption, staff and customer churn. Whilst businesses are busy investing huge amounts of money in the latest high-tech information security products, we shouldn’t forget the importance of bolstering internal security through staff training and security measures such as encryption and access management. After all the second largest contributor to data breaches globally is human e.

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications