Latest posts

Cyber Fraud in the Cloud.

Although it's taken a lot of convincing, both individuals and organizations feel more comfortable hosting their software and available services in the cloud, most noticeably, business owners find it hard to argue with the low cost- opportunities. Comparing a full suite of operational and tracking services where both clients and staff can log in, view and edit the process of current projects for $3-500 a month, with the cost per square foot in your office space, makes even the most techno-phobic of business owners perk up and listen.

The Dark Trace Report: Removing human error.

And what about internal leaks of information? Who can predict which frustrated employee may decide to leak a piece of code that could endanger thousands of people, workers or simply destroy your business interests?

Ok breathe…You aren't the only one who is worried. The Superheroes of the cyber world have come out to fight and there is good news on the virtually emerging horizon.

Brainjacking: The Vulnerability of Medical Implants.`

To date, we are yet to figure out how to protect our phones or computers whiles hackers are already breaking into cars, houses and power grid systems. Perhaps the biggest threat posed yet is for implanted medical devices. With a few lines of code, a hacker can control a patient’s pacemaker, or any other medical implants regardless of where they are situated in the body.

Why are we suddenly so interested in Bitcoins?

A survey conducted by Citrix, a corporate networking company, indicates that IT departments too are preparing for unapparent attacks through bitcoin reservation. This survey was conducted in the UK, where a third of the subjects (with a worker base of more than 250 professionals), out of 250 agreed to stockpiling the currency. Moreover, most of these firms indicated that they didn’t maintain a consistent backup.

Yellow Dot Spy Code.

Such revelations surface at a time when the Russian president, Putin denied any State involvement. Russia stood accused of interfering with USA election systems, contributing to President Trump’s victory.

Winner’s arrest draws attention to facts we should all be concerned about. Why? Because forensic analysis of a printer revealed that she was responsible for printing out the classified information and sharing it.

Microsoft to close a deal with Hеxаdіtе

In a bold move, Microsoft has taken a giant leap and signed an аgrееmеnt to acquire Hеxаdіtе, a company dеlіvеrіng аgеntlеѕѕ, automatic incident investigation аnd rеmеdіаtіоn ѕоlutіоnѕ. to ѕuрроrt оngоіng іnvеѕtmеntѕ in nеxt-gеn ѕесurіtу іnnоvаtіоn. Thе tеrmѕ оf thе аgrееmеnt hаvе not bееn dіѕсlоѕеd.

Hеxаdіtе headquarters are bаѕеd іn Boston, with a team of rеѕеаrсhеrѕ іn Tеl-Avіv, Iѕrаеl. In May, Iѕrаеlі fіnаnсіаl nеwѕ wеbѕіtе Calcalist ѕаіd Microsoft would рау US$100 mіllіоn for Hеxаdіtе.

Android Vulnerabilities in Cyber Security

Less Western Nations, such as China who have decided to protect themselves through somewhat extreme measures, such as removing the Microsoft remote control (Telemetry) provide a strict government censorship but great security for cyber users.

But what about the other countries and other American made technologies? As we know Windows systems are still prone to cyber-attack and the CIA continues to stockpile cyber weapons that are vulnerable to hackers stealing them.

A reason to join us at Cyberhub Summit: Your social media networks

Digital information is widespread throughout each interpersonal organization today. We regularly observe features of social media falling flat and big-name accounts being hacked: Sony, Yahoo etc.

However, this is just the tip of the iceberg. Significantly more loathsome actions happen over these social channels, while most associations stay unprotected and uncovered. Organizations’ poor online networking and security systems can endanger their brands, clients, officials, and whole associations.

Social Media