Monthly Archives: February 2019
The Purpose of Neural Networks in Cryptography
By Milica D. Djekic Through the entire history of the Human Kind, nature would keep surprising and surprising us with its wonders. So many beings on our planet got the […]
SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM
.Security experts at Check Point discovered a new backdoor dubbed ‘SpeakUp’ targeting Linux servers in East Asia and Latin America. Malware researchers at Check Point have spotted a new Linux […]
QuadrigaCX exchange lost access to $145 Million funds after founder dies
QuadrigaCX Bitcoin exchange announced to have lost USD 145 million worth of cryptocurrency because the only person with access to its cold storage has died. QuadrigaCX, the major Bitcoin exchange […]
The Challenges of Endpoint Security
By Milica D. Djekic The endpoint devices are those gadgets that would be the part of a big computing network dealing with the endpoints as its final destinations. The endpoints […]
How to Combat a Terrorist Attack Using Modern Communications
By Milica D. Djekic Combating the terrorist attack is a challenge for security, safety, and community. Through the previous period of time, we are witnessing the different types of terrorist […]
Best Practices for Balancing BYOD with Mobile Security
Protecting Sensitive Data in a Mobile-First World By JT Keating, Vice President of Product Strategy, Zimperium The rapid evolution and advancement of technology have made us almost incapable of […]
Cyber-security in New York City, the Financial Capital of the United States
NYC Accelerates the Development of a Cybersecurity Cluster to Protect the Financial Capital from Cyberattacks By Uzi Scheffer, CEO of SOSA New York City is the financial capital of the […]
Cyber Attacks: The Biggest Threat for Future Weapons
Are cyber-attacks become more efficient that kinetic ones? by Julien Chesaux, Cyber Security Consultant, Kudelski Security Introduction Cyber-attacks have become a conventional component of warfare domains, joining the traditional ones […]
Operators of the TheMoon botnet offer it as a service
Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service. Experts at the CenturyLink Threat Research Labs observed a […]
Using PAM for Cyber Forensics & Security Breach Remediation―Key to a Safer 2019
Author: Morey Haber, CTO, BeyondTrust No one wants to respond to a security incident or a breach, particularly at the start of a new year! Instead, the highest priority should be to […]
Free eBook: Mastering Linux Security and Hardening ($23 Value) FREE For a Limited Time
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. This book has extensive coverage of techniques that will help prevent attackers from breaching your […]
Security Have and Have-Nots
How organizations can stay above “The Security Poverty Line” by Javvad Malik, security advocate, AlienVault Way back in around the 2010 / 2011 time-frame Wendy Nather coined the phrase “The […]
Operation Eligible Receiver 97’s Impact on Ransomware
In 1997, the NSA conducted an organized attack on the Department of Defense’s critical information systems, an exercise named Operation Eligible Receiver 97 (ER 97). Throughout the exercise, the NSA […]
Security – Being Proactive vs. Reactive
by Amit Ashbel, Security Evangelist at Cognigo In today’s IT market, no other sector is currently as large or relevant as cybersecurity. From endpoint security and network protection to anti-fraud […]
IBM experts warn of malicious abuses of Apple Siri Shortcuts
IBM’s security researchers demonstrated that the Siri Shortcuts introduced in the Apple iOS 12 can be abused by attackers. Apple implemented Siri Shortcuts in the iOS 12 to allow users […]
It’s Tax Season…for Cryptocurrency
Cryptocurrency has much to do with information security. There’s electronic commerce implications – remember Overstock.com was the first major online merchant to accept bitcoins. Then, there’s all that cryptowallet technology […]
Meeting the Threat in 2019: Cybersecurity for Retail Companies
Envisioning a Future of Prevention By Megan Berkowitz Though it was not disclosed for roughly a year, ride-share company Uber was the victim of a 2016 cyber-attack that led to […]