New Cyber Security Strategies For Government Institutions
The government faces threats from a growing set of sophisticated malicious personalities who seek to exploit cyberspace. It includes espionage, political and ideological interests and financial gain. In one of the report of US Department of Homeland Security dated May 15, 2018, intrusions in one of the federal agency resulted in the compromise of personnel
[ Read More ]Strengthen Your Email Security With These Tips
After his team of computer security researchers from the IT Security Lab of Munster University in Germany discovered a set of vulnerabilities on software PGP (Pretty Good Privacy) and S/MIME (Secure/Multipurpose Internet Mail Extensions), professor Sabastian Schinzel warned the users of those encryption applications to immediately disable and delete them. Schinzel’s research group dubbed the
[ Read More ]Here’s How To Keep Your Routers Protected From Hackers
In light of the current geopolitical strife surrounding Syria, authorities in both the US and the UK have alerted their citizens that Russian hackers are on a campaign to take over routers and network devices in their respective countries. The FBI, Department of Homeland Security, and the UK National Cyber Security Centre have issued a
[ Read More ]Hackers Steal Millions From Mexican Banks By Targeting Payment Systems
Mexico’s central bank Governor Alejandro Diaz de Leon told journalists late Monday that the attack on the payment system was unprecedented and that he hoped that measures being taken would stop future incidents. Hackers have managed to get away with hundreds of millions of pesos from leading Mexican banks by targeting the payment systems. Reuters
- Jenn Jeffers
- 0
- Attacks
- 0
- 2.7K
This Ransomware Went From Stealing Passwords To Hijacking PCs
An interesting piece of news- a malicious website which was in fact set up to make visitors pay a cryptocurrency ransom has now reportedly changed its course. Now, instead of asking for a ransom, the malicious website hijacks your system’s processing power and does cryptocurrency mining, in the background. This malicious website was designed as
[ Read More ]Why Spending Billions Still Hasn’t Protected Web Applications
A recent study report points out that 100 percent of web applications are vulnerable to attack, despite billions that companies would spend on cybersecurity efforts. Trustwave’s eleventh annual Global Security Report, released last week, says that in 2018 companies would be spending an estimated $96 billion on cybersecurity efforts, but 100 percent of web applications
[ Read More ]What Are IoT Devices And How Are They Changing The World?
The Internet of Things (IoT) is progressively important to enterprises, as these technologies improve communication and productivity in multiple industry sectors. According to Gartner, a global IT research and advisory firm, the consumer segment is the biggest user of connected things with 5.2 billion units in 2017. The information these gadgets gather will develop with
[ Read More ]Why Is Cybersecurity Such A Hassle For Small Businesses?
We don’t frequently hear reports about the hacking of small businesses, mainly because these kinds of attacks aren’t public knowledge. The news regularly reports regarding large corporations confronting massive data breaches where the individual data of millions of consumers was possibly leaked. The reason small businesses are engaging targets is that hackers know these companies
[ Read More ]Cyber Security 101: Assurance Against Technology Threats
Digital assaults hit the headlines consistently and they are not just a risk to large companies, governments, and banks but also to small businesses and individuals. Cyber attacks have existed since the beginning of the Web, however, they’ve turned out to be more complex and far-reaching after some time. It is now more organized and
[ Read More ]Why Are DDoS Attacks So Risky?
A DDoS (Distributed Denial of Service) attack utilizes an assortment of methods to send endless junk requests to a site, boosting so much traffic to it, making the website almost impossible for anybody to load the page. DDoS attacks regularly misuse the staggering power of a botnet, which can comprise hundreds or a huge number
[ Read More ]