Latest posts

Cyber security-Penetration Testing

Cybersecurity deals with security of the application, information, and systems. It also includes operational security, disaster recovery and education of the end user. Constantly changing nature of security risk have made Cybersecurity challenging. In the current environment, the threat is advancing quickly, and the emergence of technology have made the cyber security approaches insufficient. The global cyber security market is growing on a continuous basis mentioned in Forbes. In 2015 it reached $75 billion, and it is expected to hit $170 billion in 2020.

The Truth Behind Social Engineering 1/3

My name is Karin Zalcberg and I am the Founder and CEO of CyberHub USA and today I want to write about a topic that is worldwide, breakthrough and painful – that is, “social engineering”.  This is the first edition in my 4-part Social engineering blog special. You will want to tune in for each of these.

First, allow me to define what social engineering is.

The Top Four Ways Hackers choose their next Victim.

Your best bet is to have a greater awareness of the typical and obvious vulnerabilities present in your system, because whilst many victims ask "Why me?", we ask "Why does it matter?" 

You may have been chosen randomly or you may be a target because of the nature of your business, the truth is, you'll never know. What you can know, is how a typical hacker operates and make yourself into a hard to reach and complicated prospect.

To begin our series of looking at the Hacker from the 'Inside out" here are four approaches that hackers use to lock on to their next target:


According to the U.S. government, the state-sponsored cyber unit, codenamed Hidden Cobra, targets telecoms and financial institutions using sophisticated tools known as Bankshot, Badcall and Hardrain and Fallchill. It has links to previous attacks on SWIFT, the transfer network which connects more than 10,000 banks.