Monthly Archives: October 2019
The ways of responding to a terrorist encryption
By Milica D. Djekic The encryption may get a crucially significant point in some communication or information exchange activities. It’s not only important to a Defense Force as it may […]
Facial Recognition: Killing the Password One Photo ID at a Time
By Stephen Stuut, CEO of Jumio In today’s complex cybersecurity landscape, the notion of utilizing a password to validate a The user’s authenticity is rudimentary. Cybercriminals can retrieve passwords in […]
Raccoon info stealer already infected 100,000+ worldwide
A new information stealer, dubbed Raccoon, made the headlines infecting hundreds of millions of victims worldwide. Security experts at Cybereason have spotted a new information stealer, dubbed Raccoon, that is […]
Three Key Business Lessons From The Founder of a Big Data Security Company
By MacLane Wilkison, Co-Founder of ZeroDB When startups mix with corporations we see an oil-and-water effect. There’s often a gap in work practices, organizational structure, and managerial outlook, not to […]
No One Likes Passwords, So Why Are We Still Using Them?
Users Deserve Better, Websites Need to Deliver By Charles Durkin, Chief Executive Officer, Privakey Creating a new online account is a dreaded task for most internet users. Complexity and security […]
Improving Quality And Security With Binary Analysis
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction: Companies serious about quality, safety, and security need to manage the risks in their supply chain, including software such as commercial of […]
Adding Efficiency to Security
By Dave Thompson, Senior Director, Product Management, LightCyber The words “operational efficiency” and “security” are generally not commonly used together. I’m amazed that after 20 years in the networking/network security […]
The packet analysis as a helpful way of network monitoring
By Milica D. Djekic The internet packets are the sets of information being created and transmitted to carry on a message through the network’s communications. These packets may consist of […]
Layered Security
Two locks are better than one By David Share, Director, Amazing Support Imagine you had a million dollars (or pounds). Heck, let’s go crazy and say you have a billion […]
How Can You Tell If Your WordPress Site Has Been Hacked?
WordPress is the foundation of a large chunk of the web, which makes it an obvious target for criminals and hackers. If attackers find a vulnerability in WordPress, they have […]
Cybersecurity: Why Your Cell Phone is Your Weakest Link
The internet of things. It’s a wonderful product of society’s love of technology and needs to make daily tasks more efficient. Think about it. How many devices do you own? […]
Lock, stock and two smoking … access controls
By Milica D. Djekic The point of this article would not be to deal with some of London’s gangs, but rather to present what the access control is and why […]
Belfast – The New Hotbed for Cybersecurity Talent
By Olivier Vallez New York, NY – Like many people, my perception of Northern Ireland conjures images of dreary weather, stone thatched houses, and when it comes to industry, perhaps […]
How to Protect Your PC and Keep Your Data Safe with MiniTool ShadowMaker
Virus attacks, malware, and mistaken operations can cause a system crash. Mistaken deletion and mistaken formatting can cause data loss. It’s troublesome to reinstall the operating system if the system […]
Czech Police and Intelligence agency dismantled Russian Spy ring on its soil
Czech police and intelligence services have identified a Russian espionage network operating having a nerve center in its Prague embassy. Czech police and intelligence services have dismantled a Russian espionage […]
Understanding Bluetooth and its role in the Internet of Things
By Dimitri Vlachos, VP of Marketing, Pwnie Express Bluetooth technology was originally designed for continuous, streaming data applications – essentially, it was intended to replace wires to create the possibility […]
Privacy and Security Issues in Autonomous Cars
By David Navetta, Boris Segalis, and Kris Kleiner, Norton Rose Fulbright US LLP As the development of self-driving car technology progresses, the prospect of privately-owned autonomous vehicles operating on public […]
5 mistakes hindering effectiveness of SIEM solutions: Learning from real-life cases
With a SIEM solution installed, the security department can think it’s time to grab some popcorn and watch the system perfectly dealing with all possible threats impending their networks. Ah, […]
E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
A brief digest from the E-Scrap Conference & Trade Show 2019 Orlando, FL – What happens to our beloved tech devices when they die? Wouldn’t it be great if the […]
OPEN ACCESS APIs
WHAT NEEDS TO BE DONE TO MAKE THE PLATFORM MORE SECURE By David Midgley, Head of Operations, Total Processing I’m sure if you’re reading this, you already have a reasonable […]
SecurityScorecard – Risk Assessment Made Simple!
An interview with Susanne Gurman of SecurityScorecard, from Black Hat 2019 Las Vegas, NV – Amidst all the hustle and bustle of Black Hat 2019, I was privileged to have […]
The Evolving Landscape of Cybersecurity for SME’s
A brief digest from the SecureWorld New York 2019 New York, NY – With all the high-profile cyberattacks receiving coverage in the media as of late, cybersecurity is quickly becoming […]
NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches
NordVPN and TorGuard VPN firms were hacked, threat actors leaked the private keys used to secure their web servers and VPN configuration files Hackers have breached the systems used by NordVPN […]
The implementation of SOCs with the SMEs
By Milica D. Djekic The security operations centers (SOCs) are cybersecurity systems that are capable to provide security in a both – technological and organizational manner. Through this review, we […]
Best Practices for Remote and Branch Office Data Protection
By Gregg Petersen, Regional Director, Middle East, and SAARC, Veeam Software We’ve all heard about fantastic new data center technologies, but all too often it looks like these technologies only […]
Hundreds of millions of UC Browser Android Users exposed to MiTM attacks
Over 600 million UC Browser and UC Browser Mini Android users have been exposed to man-in-the-middle (MiTM) attacks. More than 600 million users of the popular UC Browser and UC […]
How a Cyber Attack Could Kill Your Website – Permanently
By Phillip Adcock, Managing Director, Shopping Behaviour Xplained Ltd Shopping online has become the standard way to do things. But with many shoppers wary of online services, site owners should […]
Ransomware: Not Your Typical Threat
Lower Ransomware Risk with Education, Planning, and Relationship Building By Jon Leer, Writer, Leer Technical Communications, LLC Interviewed: John Galda, Director of Risk/Security at Charles River Development © Valerijs Novickis […]
Securing the Hybrid Cloud: What Skills Do You Need?
By Raj Samani, chief technology officer, EMEA, Intel Security Group Hybrid cloud models offer many well-documented benefits, but they also introduce more complexity for securing data and applications across the […]
How to protect an enterprise from physical attacks
By Yana Yelina, Tech Journalist, EffectiveSoft Nowadays, none of the enterprises is immune to cyberattacks, data breaches, malware, and other types of damage. As a result, news about information leakage […]