Cybersecurity

BEC Scams, A Profitable Phishing Technique

Only a few groups in the cybersecurity industry know or even heard the name “Scattered Canary”, it is considered as a “cyber-gang” with at least a dozen members set to issue targeted BEC (Business Email Compromise) campaigns. Scattered Canary started its operations more than ten years ago, with only a few members, the team targeted

[ Read More ]

Drone Technology a Rising Threat to Cybersecurity

Drones have become immensely popular all across the world and today drones can be bought and flown by anyone. People use drones for different purposes, ranging from filmmaking and photography to surveillance and agriculture. The trend to use drones for delivering packages and to ship medical samples is also picking up. Well, for any technology,

[ Read More ]

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]

Healthcare Institutions And Cyber Security Preparations

The healthcare industry’s market is rapidly expanding as the population ages on a global scale. Therefore, in the medical and pharmaceutical fields, digital transformation is promoted and the way of next-generation healthcare is required. Cost of healthcare increases all the time, therefore, governments should formulate new health and medical strategy fit for their country. All

[ Read More ]

These Are The Emerging Cybersecurity Threats Of 2019

The Cyber Security arms race between hackers and security professionals took another turn in 2018 as the escalation of technology between the two sides continues. According to the Cisco’s 2018 Annual Cybersecurity Report, hackers layered their attacks with new techniques and innovations that challenged the cybersecurity defenses of organizations across the world. According to the

[ Read More ]

What Went Wrong: The 2019 Humble Bundle Security Breach Case

Humble Bundle, the digital storefront for video games is a blessing for indie game developers for at least 8 years now. The company which now operates as a subsidiary of Ziff Davis since October 2017, has been a strong force of distributing indie game titles that will otherwise are not visible to a typical gamer.

[ Read More ]

2019 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Minnesota’s Department of Human Service, Latest Victim Of Phishing

Minnesota’s Department of Human Services (DHS) headed by its Commissioner Tony Lourey has issued a document to both houses of Congress detailing its data breach happened with the department affecting 11,000 people. It only took the hackers to persuade a DHS employee in opening an “invoice” email, and the department normally receives 92,500 phishing/spam emails

[ Read More ]

A Quick Glimpse Of Hong Kong’s Cybersecurity Readiness

The Hong Kong Special Administrative Region has governed under a One-China, Two-systems policy since 1997. That means the great firewall of China which is enforced in the mainland is not applied in Hong Kong. It decides on its own about its internal policies when it comes to governance, including the responsibility of making sure that

[ Read More ]

Top 10 Misconceptions In Cybersecurity

Cybersecurity is a big word that is being used by IT professionals and the mainstream media nowadays, unfortunately, the latter still lack understanding on how to explain it to common people. There is a gap between how the cybersecurity vendor markets their products and services vs how the mainstream media handle the reports as if

[ Read More ]