Warning All Corporate Executives, Cybersecurity Is Your Problem!

It’s official—2017 was a record year for massive data breaches. First and foremost, there was the Equifax disaster, which exposed the hyper-private data of millions of customers to cybercriminals. And then there was the Republic National Committee breach, which leaked the personal information of over 200 million American voters. And don’t forget the Uber scandal, which

[ Read More ]

The Importance Of Cybersecurity Teams In Government Agencies

If a government agency’s purpose is to help the government move towards a more modern approach to service delivery, focused on citizens and innovation centered on using the latest and best technology there is—how important is it to have its own cybersecurity team in-house? The Digital Transformation Agency of Australia drives the digital information of

[ Read More ]

Reeling From Cyberattacks, EU Revamps Their Future Plans

Two massive cyber attacks in May and April 2017, the Wannacry virus and the NoPetya attack on Ukraine, tested Europe’s cyber defenses and showed the EU sorely needs to upgrade its threat response. Both viruses exposed various loopholes in security protocols and the lack of countermeasures against the malicious applications. The WannaCry ransomware virus infected

[ Read More ]

Battling a Ransomware on Your System the Right Way

Ransomware don’t discriminate between good guys and bad guys. Two Ontario-based non profit organization are the latest victims of a ransomware. In order to fight these kind of threats,we must first know the details regarding this ransomware. For the record, there were more than 7600 ransomware attacks reported to the Internet Crime Complaint Center (IC3)

[ Read More ]

Hackers Love The EternalBlue Exploit Because You Hate It

There is one thing small-time hackers and heavy-hitting black hats have in common—they both love the exploit known as EternalBlue. Evolved from the famous computer worms Conficker and Welchia, EternalBlue employs diverse exploits with new, brilliant-devised, and easy to deploy applications. As a hacker favorite, it leaves digital devastation in its wake while taking advantage of any unpatched

[ Read More ]

Experts Warn: Destructive Ransomware Is Headed This Way

Ransomware nowadays might seem to be silent, but it is still around, and more attacks using the file-encrypting malware are just waiting for the right timing. Famous malware like WannaCry,NotPetya and Bad Rabbit made ransomware out of limelight. WannaCry and NotPetya are both associated to be the work of nation states -former North Korea and

[ Read More ]

Pawned: People Who Got Hacked Tell Their Stories

We hear about various hacks through the news, and most of the time, we only tend to remember the statistics about how many accounts were affected, what details were leaked, and how much loss the company faced in the form of dollar bills. But honestly, these stories don’t hold much of a human appeal—and they

[ Read More ]

Here’s Why System Patch Updates And User Management Are Key

Every operating systems are not created perfectly. Every distributions are continuously updating for better and secured performance. As part of enforcing security management, it is also recommended to manage properly the file permissions for users. Hackers are always there searching for security holes that they can exploit. System updates help plug these holes,leaving the hackers

[ Read More ]

Bet You Don’t Know How Autorun Can Save You From Ransomware

Horror fanatics know the consequences of an encounter with the evil doll Annabelle. People should similarly beware of the same-named ransomware, which possesses a bunch of evil tricks to wreak havoc on the computer. The developers of this ransomware want to showcase their programming skills. Though it is easily decryptable, this ransomware can prove it’s

[ Read More ]

Hackers Launch New Attacks Using Old Adobe Vulnerability

A known critical vulnerability in the Adobe Flash Player can serve as a gateway for cybercriminals to hijack your computer. Researchers from cyber security research group Morphisec spotted the vulnerability in use in a phishing campaign using Word documents. This is the second time this vulnerability code named CVE-2018-4878 appears as a tool for an

[ Read More ]