combatcyber

Latest posts

Inability to audit U.S. elections a 'national security concern': Homeland chief

The U.S. Department of Homeland Security (DHS) was prioritizing election cyber security above all other critical infrastructure it protects, such as the financial, energy and communications systems, the agency’s chief, Kirstjen Nielsen, told the Senate Intelligence Committee.

The hearing to examine the Trump administration’s efforts to improve election security came following U.S. intelligence officials’ repeated warnings that Russia will attempt to meddle in the 2018 contests after doing so during the 2016 presidential campaign.

Cyber security-Penetration Testing

Cybersecurity deals with security of the application, information, and systems. It also includes operational security, disaster recovery and education of the end user. Constantly changing nature of security risk have made Cybersecurity challenging. In the current environment, the threat is advancing quickly, and the emergence of technology have made the cyber security approaches insufficient. The global cyber security market is growing on a continuous basis mentioned in Forbes. In 2015 it reached $75 billion, and it is expected to hit $170 billion in 2020.

The Truth Behind Social Engineering 1/3

My name is Karin Zalcberg and I am the Founder and CEO of CyberHub USA and today I want to write about a topic that is worldwide, breakthrough and painful – that is, “social engineering”.  This is the first edition in my 4-part Social engineering blog special. You will want to tune in for each of these.

First, allow me to define what social engineering is.

The Top Four Ways Hackers choose their next Victim.

Your best bet is to have a greater awareness of the typical and obvious vulnerabilities present in your system, because whilst many victims ask "Why me?", we ask "Why does it matter?" 

You may have been chosen randomly or you may be a target because of the nature of your business, the truth is, you'll never know. What you can know, is how a typical hacker operates and make yourself into a hard to reach and complicated prospect.

To begin our series of looking at the Hacker from the 'Inside out" here are four approaches that hackers use to lock on to their next target: