combatcyber

Latest posts

Yellow Dot Spy Code.

Such revelations surface at a time when the Russian president, Putin denied any State involvement. Russia stood accused of interfering with USA election systems, contributing to President Trump’s victory.

Winner’s arrest draws attention to facts we should all be concerned about. Why? Because forensic analysis of a printer revealed that she was responsible for printing out the classified information and sharing it.

Microsoft to close a deal with Hеxаdіtе

In a bold move, Microsoft has taken a giant leap and signed an аgrееmеnt to acquire Hеxаdіtе, a company dеlіvеrіng аgеntlеѕѕ, automatic incident investigation аnd rеmеdіаtіоn ѕоlutіоnѕ. to ѕuрроrt оngоіng іnvеѕtmеntѕ in nеxt-gеn ѕесurіtу іnnоvаtіоn. Thе tеrmѕ оf thе аgrееmеnt hаvе not bееn dіѕсlоѕеd.

Hеxаdіtе headquarters are bаѕеd іn Boston, with a team of rеѕеаrсhеrѕ іn Tеl-Avіv, Iѕrаеl. In May, Iѕrаеlі fіnаnсіаl nеwѕ wеbѕіtе Calcalist ѕаіd Microsoft would рау US$100 mіllіоn for Hеxаdіtе.

Android Vulnerabilities in Cyber Security

Less Western Nations, such as China who have decided to protect themselves through somewhat extreme measures, such as removing the Microsoft remote control (Telemetry) provide a strict government censorship but great security for cyber users.

But what about the other countries and other American made technologies? As we know Windows systems are still prone to cyber-attack and the CIA continues to stockpile cyber weapons that are vulnerable to hackers stealing them.

A reason to join us at Cyberhub Summit: Your social media networks

Digital information is widespread throughout each interpersonal organization today. We regularly observe features of social media falling flat and big-name accounts being hacked: Sony, Yahoo etc.

However, this is just the tip of the iceberg. Significantly more loathsome actions happen over these social channels, while most associations stay unprotected and uncovered. Organizations’ poor online networking and security systems can endanger their brands, clients, officials, and whole associations.

Social Media

How do Millennials Affect Cyber Security?

So where do millennials come in? It’s hard enough when outside forces that you can’t control such as a hacker group get their hands on your weapon, but what if the leak starts on the inside? We increasingly find that Millenials, using Howe and Strauss definition of the demographic cohort of individuals born between 1982 and 2004, feel a greater international and ideological social obligation than the obligation to protect the assets of the company they work for.

Cyber Insecurity - Can the new Google Security Measures Protect Us All?

If you have a Mac computer the chances of you getting hacked are pretty low, as due to  Windows proliferation in the marketplace most cyber-attacks target computers with Windows systems, so if you have a Mac you are safe and sound.

But what do you do if you have an android device like most people out there?

Ah - ha..

Cyber Security Risk Management

Cyber Security Risks: different and more dangerous than any other business risk? Cyber security and Risk Management, focuses on the integration of cyber security risk management in the enterprise risk management framework. Cyber security risks have been a concern ever since 1969, when the first nodes of data were transmitted over the precursor to the World Wide Web. The World Economic Forum now ranks them among the greatest threats to global stability - bested only by war, drought, climate change and large-scale migration.