Cybersecurity

Data Breach Hits Malaysian University, Personal Data Leaked

A massive data breach that had reportedly hit a prominent Malaysian university has resulted in personal data of over one million people being leaked online. As per reports, personal details of over one million students and alumni of the UiTM Universiti Teknologi Mara have been breached and leaked online. This breach has reportedly occurred between

[ Read More ]

Newly Released ATLAS MMORPG, Newest Victim of “PewDiePie” Meme Attacks

Playing an online game is one of the most relaxing activity a person can engage without leaving the conveniences of one’s home. Unfortunately, this may not always the case these days, as the game can experience cybersecurity issue as well just like any computer system. This scenario happened recently with ATLAS, the newly released Massively

[ Read More ]

Ransomware Prevention Tips for the Healthcare Industry

When the WannaCry ransomware struck around mid-2017, one of the organizations most impacted was the NHS (National Health Service) in the UK. Service was affected adversely in hundreds of NHS facilities; thousands of appointments had to be canceled, operations had to be postponed and patients had to be urgently relocated from many emergency centers were

[ Read More ]

What Is Brute force And Dictionary Attacks?

Brute force attack means a repeated login attempt by criminals using every possible method like; letter, characters, number, and other combinations to guess a password. The attacker uses this technique to get one of the three things: an administrator password, a password hash key, or an encryption key. Getting a short password can be easy

[ Read More ]

24 Northeastern Ontario Hospital Hacking Incident, The Aftermath

Twenty-four Northeastern Ontario hospitals were victims of the latest cyber attack with the use of zero-day exploits. Zero-day exploits are unknown security bugs in software that are actively exploited by hackers in order to gain control, launch malware or open other vulnerabilities in the target system. The attack estimated to have occurred last January 16,

[ Read More ]

Cyber Security Hacking Tools You Must Be Aware Of

Not all cyber attacks are caused by newly developed tools, nor by advanced hackers using zero-day exploits. Many of the hacks occur due to the use of off-the-shelf hacking tools and exploits, which are available for download on the Internet today. A pattern for use of off-the-shelf hacking tools was detected 5 African states: Ivory

[ Read More ]

The Importance of Security in Mergers & Acquisitions

Mergers and Acquisitions- big things happening in the world of business. M&As have yielded wonderful results and have even resulted in the genesis of some of the most successful of business firms. Well, let’s look at another aspect of the M&A process. Typically seen as a mere boardroom thing, there are other aspects of M&A

[ Read More ]

Chinese Scammers Use Social Engineering to Swindle $18.6M

Fraud transaction through clever social engineering enabled Chinese phishers in successfully swindling an estimated $18.6 million from Tecnimont SpA’s Indian branch. With a cleverly written email that heavily resembles Pierrorberto Folgiero’s (the company’s Group CEO) was sent to Tecnimont Pvt Ltd, the phishers were able to persuade decision makers in the company’s India office to

[ Read More ]

Use Security Technology to Improve Business Operations

Security technology would continue to be as important for businesses in 2019 as it was in 2018; in fact, it would be much more important in 2019 than it was in 2018. As we know, security technology today is integral to business operations and contributes greatly to the continuity of any business and its operational

[ Read More ]

NZ Transport Agency’s Missing USB Drive a Major Data Breach

The New Zealand’s Transportation Agency is in the hot seat as a very important USB flash drive containing personal information of at least 1,000 of their employees is missing. Usually, personnel information is stored cryptographically locked in a secure server, however, due to the need to produce identification cards for 1,000+ employees, it needs to

[ Read More ]