Monthly Archives: February 2019

The Purpose of Neural Networks in Cryptography

By Milica D. Djekic Through the entire history of the Human Kind, nature would keep surprising and surprising us with its wonders. So many beings on our planet got the […]

Posted in Cyber Security News | Comments Off on The Purpose of Neural Networks in Cryptography

SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM

.Security experts at Check Point discovered a new backdoor dubbed ‘SpeakUp’ targeting Linux servers in East Asia and Latin America. Malware researchers at Check Point have spotted a new Linux […]

Posted in Cyber Security News | Comments Off on SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM

QuadrigaCX exchange lost access to $145 Million funds after founder dies

QuadrigaCX Bitcoin exchange announced to have lost USD 145 million worth of cryptocurrency because the only person with access to its cold storage has died. QuadrigaCX, the major Bitcoin exchange […]

Posted in Cyber Security News | Comments Off on QuadrigaCX exchange lost access to $145 Million funds after founder dies

The Challenges of Endpoint Security

By Milica D. Djekic The endpoint devices are those gadgets that would be the part of a big computing network dealing with the endpoints as its final destinations. The endpoints […]

Posted in Cyber Security News | Comments Off on The Challenges of Endpoint Security

How to Combat a Terrorist Attack Using Modern Communications

By Milica D. Djekic Combating the terrorist attack is a challenge for security, safety, and community. Through the previous period of time, we are witnessing the different types of terrorist […]

Posted in Cyber Security News | Comments Off on How to Combat a Terrorist Attack Using Modern Communications

Best Practices for Balancing BYOD with Mobile Security

Protecting Sensitive Data in a Mobile-First World By JT Keating, Vice President of Product Strategy, Zimperium   The rapid evolution and advancement of technology have made us almost incapable of […]

Posted in Cyber Security News | Comments Off on Best Practices for Balancing BYOD with Mobile Security

Cyber-security in New York City, the Financial Capital of the United States

NYC Accelerates the Development of a Cybersecurity Cluster to Protect the Financial Capital from Cyberattacks By Uzi Scheffer, CEO of SOSA New York City is the financial capital of the […]

Posted in Cyber Security News | Comments Off on Cyber-security in New York City, the Financial Capital of the United States

Cyber Attacks: The Biggest Threat for Future Weapons

Are cyber-attacks become more efficient that kinetic ones? by Julien Chesaux, Cyber Security Consultant, Kudelski Security Introduction Cyber-attacks have become a conventional component of warfare domains, joining the traditional ones […]

Posted in Cyber Security News | Comments Off on Cyber Attacks: The Biggest Threat for Future Weapons

Operators of the TheMoon botnet offer it as a service

Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service. Experts at the CenturyLink Threat Research Labs observed a […]

Posted in Cyber Security News | Comments Off on Operators of the TheMoon botnet offer it as a service

Using PAM for Cyber Forensics & Security Breach Remediation―Key to a Safer 2019

Author: Morey Haber, CTO, BeyondTrust No one wants to respond to a security incident or a breach, particularly at the start of a new year! Instead, the highest priority should be to […]

Posted in Cyber Security News | Comments Off on Using PAM for Cyber Forensics & Security Breach Remediation―Key to a Safer 2019

Free eBook: Mastering Linux Security and Hardening ($23 Value) FREE For a Limited Time

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. This book has extensive coverage of techniques that will help prevent attackers from breaching your […]

Posted in Cyber Security News | Comments Off on Free eBook: Mastering Linux Security and Hardening ($23 Value) FREE For a Limited Time

Security Have and Have-Nots

How organizations can stay above “The Security Poverty Line” by Javvad Malik, security advocate, AlienVault Way back in around the 2010 / 2011 time-frame Wendy Nather coined the phrase “The […]

Posted in Cyber Security News | Comments Off on Security Have and Have-Nots

Operation Eligible Receiver 97’s Impact on Ransomware

In 1997, the NSA conducted an organized attack on the Department of Defense’s critical information systems, an exercise named Operation Eligible Receiver 97 (ER 97). Throughout the exercise, the NSA […]

Posted in Cyber Security News | Comments Off on Operation Eligible Receiver 97’s Impact on Ransomware

Security – Being Proactive vs. Reactive

by Amit Ashbel, Security Evangelist at Cognigo In today’s IT market, no other sector is currently as large or relevant as cybersecurity. From endpoint security and network protection to anti-fraud […]

Posted in Cyber Security News | Comments Off on Security – Being Proactive vs. Reactive

IBM experts warn of malicious abuses of Apple Siri Shortcuts

IBM’s security researchers demonstrated that the Siri Shortcuts introduced in the Apple iOS 12 can be abused by attackers. Apple implemented Siri Shortcuts in the iOS 12 to allow users […]

Posted in Cyber Security News | Comments Off on IBM experts warn of malicious abuses of Apple Siri Shortcuts

It’s Tax Season…for Cryptocurrency

Cryptocurrency has much to do with information security.  There’s electronic commerce implications – remember Overstock.com was the first major online merchant to accept bitcoins.  Then, there’s all that cryptowallet technology […]

Posted in Cyber Security News | Comments Off on It’s Tax Season…for Cryptocurrency

Meeting the Threat in 2019: Cybersecurity for Retail Companies

Envisioning a Future of Prevention By Megan Berkowitz Though it was not disclosed for roughly a year, ride-share company Uber was the victim of a 2016 cyber-attack that led to […]

Posted in Cyber Security News | Comments Off on Meeting the Threat in 2019: Cybersecurity for Retail Companies

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X