Plugging in a USB drive that is not yours – why would you do that?

External data storage devices have actually been around almost as long as computers have existed. Magnetic tape as well as floppies, which were when the leading media, are now mainly warm memories, while optical disks are mostly used in video gaming consoles. For the past twenty years, the dominant gamer on the exterior storage scene has been the USB flash drive. Not surprising that: for many years, their storage space ability has increased, as well as their costs have actually dropped.

2021-05-16T22:00:46-04:00May 19th, 2021|Cybersecurity Awareness, Vunerabilities, Web Security|

Ransomware Grew over 485% in 2020

Android was especially heavily targeted to spread malware and malicious apps this way, experiencing a 32% growth in reported threats during the 2nd half of 2020. Many of these involved impersonating popular video conferencing software and medical applications, particularly throughout the early stages of the COVID-19 pandemic. 

4 Methods to Safeguard Your Data from the Dark Web

It's not simply personal information that are in jeopardy. Firms of all sizes are at considerable threat of companywide data violations when employee accounts are hacked; once offenders break in, they can take advantage of stolen information for a variety of scams systems, such as business e-mail compromise, invoice fraud, as well as employment fraud. They likewise access to corporate keys, monetary accounts, employee workers documents, as well as business strategies, placing the company at high danger for financial and reputational damages.

Encryption, and why it is so important

Encryption is a safe that safeguards our individual details that is held by organizations as well as government agencies. It is a lock that avoids identity thieves from swiping our information when we go to our bank accounts. It is an added layer of safety to guard our important infrastructures. And it is a protected envelope that maintains hackers from reading our personal communications.

2021-05-14T21:42:00-04:00May 17th, 2021|Mobile Security, Privacy, Web Security|

Why IT needs to lead the next phase of data science

Most companies today have invested in data science to some degree. In the majority of cases, data science projects have tended to spring up team by team inside an organization, resulting in a disjointed approach that isn’t scalable or cost-efficient. Think of how data science is typically introduced into a company today: Usually, a line-of-business organization that wants to make more data-driven decisions hires a data scientist to create models for its specific needs. Seeing that group’s performance improvement, another business unit decides to hire a data scientist to create its own R or Python applications. Rinse and repeat, until every functional entity within the corporation has its own siloed data scientist or data science team.

Proactive vs Responsive AI: Which One Protects Against Major Modern Adversaries in Cybersecurity?

Artificial Intelligence, Machine Learning and Deep Learning are terms that constantly get thrown around in cybersecurity to the point where they’ve got a bad reputation due to false promises. However, as we move into a future with advanced adversaries that are also utilizing AI technology, the only option we have is to understand what distinguishes the good from the bad, and [...]

Cyberattack Planner – Part 3 – Scams and Fraud

Cyberattack Planner – Scams and Fraud The newer telecommunication technologies might offer countless opportunities for businesses that are small, though they likewise offer cyber criminals a lot of brand-new means to victimize the business of yours, scam the customers of yours and hurt the reputation of yours. Businesses of all sizes must be conscious of the most popular scams perpetrated online. [...]

2021-02-26T18:09:30-05:00February 15th, 2021|Cybersecurity Planning, Ransomware, Vunerabilities, Web Security|

How much is your info worth on the Dark Web? For Americans, it’s just $8

Personal information from US citizens found on the Dark Web—ranging from Social Security numbers, stolen credit card numbers, hacked PayPal accounts, and more—is worth just $8 on average, according to a new report from tech research firm Comparitech. Researchers pored through the prices of personal data and information—called "fullz" by those searching for "full credentials"—that are available for sale on nearly 50 [...]

2021-02-26T18:09:30-05:00February 8th, 2021|Passwords, Privacy, Web Security|

How can healthcare organisations fight increased cyber crime in 2021?

ContentItemController, generated at 18:49:15 Wed Feb 10, 2021, by cds6 As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Healthcare organisations have come under intense pressure following the outbreak of the Covid-19 coronavirus in 2020. But they are also battling [...]

2021-02-26T18:09:29-05:00January 21st, 2021|Cloud Security, General News, Vunerabilities, Web Security|

Ryuk gang estimated to have made more than $150 million from ransomware attacks

The operators of the Ryuk ransomware are believed to have earned more than $150 million worth of Bitcoin from ransom payments following intrusions at companies all over the world. In a joint report published today, threat intel company Advanced Intelligence and cybersecurity firm HYAS said they tracked payments to 61 Bitcoin addresses previously attributed and linked to Ryuk ransomware attacks. "Ryuk receives a [...]

2021-02-26T18:09:29-05:00January 7th, 2021|Hackers, Malware, Ransomware, Web Security|
Go to Top