combatcyber

Latest posts

How Secure is the BlockChain?

I want to start by asking you this very question? When you think of BlockChain what’s the first thing that come to your mind? (Comment Below)

            Survey is most likely to say Bitcoin and Crypto Currency. Why? That’s what we know it as. Recent trends I read, speak and discuss with others is BlockChain is also the safest technology out there. Its already safer than the technology out there today and it can’t be hacked.

            Let’s analyze this very statement. BlockChain is secure and can’t be hacked.

WEATHERING A CYBER ATTACK – A MAP THROUGH THE DIGITAL FRONTIER | BOEING, CITY OF ATLANTA – The latest casualties in ongoing cyber war

Distributed by Solution Road, Inc.

With top US and Israeli Cyber Experts in tow, Karin Zalcberg, CEO of CyberHub Summit and its partner, CyberHub Academy, says,” In the cyber-world, my clients don’t have the luxury of time to address their digital concerns and issues, “She continues, “Austin’s government and businesses move in real-time, and the hackers are moving even faster. Being prepared is essential to staying alive in business.”

Time to Panic? Potential Wi-Fi Security Breach Uncovered

This means that traffic shared over countless wireless networks globally will become an easy target for hackers and other malicious users looking to obtain sensitive information.

Biggest Internet Security Threat Ever?

Details of the latest vulnerability discovered in the WPA2 protocol have until this point not been shared with the public. The breach was discovered by the group of researchers who developed KRACK, pointedly spelled with a K and an acronym for Key Reinstallation Attacks.

The Future of Programming Human Resources

Increasingly, would-be programmers can participate in coding boot camp and learn the basics in 18 months.

This isn't to say, anyone can become a coder, they can't, in the same way that not everyone can become a Lawyer, Doctor or Accountant – even if the country you live in is willing to give you loans to pay for your education. Apart from having the smarts, you need to have a good basic grasp of IT. It takes a certain type to fill the title of Programmer, but the opportunity is very much there.

Where are the Women in Cyber Security?

The study conducted by the Center for Cyber Safety and Education showed that of all the workforce in the US information security field, only 14 per cent are women. This was an all-time low considering that 48 percent of the US workforce are women. Although the report found out that cyber security is a field that is facing acute shortage of professionals of both sexes, the shortage of women was alarming in comparison to their male counterparts.

Top Women in Cyber Security

Attack of the Phones.

Creeping because the numbers are growing and creepy, because your phone comes with this malware pre-installed.  Checkpoint believe that this malware was added into the supply chain and to phones as far back as September 2016.  

Check Point researchers have tracked this back to the distributor Tian Pai which has meant a large range of phones have been infected, namely Honor, Huawei, Xiamo and Oppo. If you haven't heard of any of them, they think that Samsung got hit too. 

Privacy in the Facebook Era

Hot off the heels of the recent Facebook Cambridge Analytica Scandal, the gateway to the Facebook problem has been pried open for all of us.

While some are swearing off Facebook permanently and shareholders are panicking, the majority of us, who may not have Facebook stock, but definitely have Facebook accounts are feeling a little uneasy about our data privacy.

Alert for 2018: The Top Four Developing Cyber Threats

Cybercrime is unlikely to take a backseat this year. In fact, it's highly likely that Cyber security will come as an intrinsic element of any automation equipment purchased.

As the innovation in the technology market continues to advance at a pace that we could have barely fathomed fifteen years ago, so do weaknesses.