Cybersecurity

7 Big Factors that makes Small Business at Risk

Small organizations still face a long list of threats to security. These threats and vulnerabilities should take precedence. Increasingly, cyber criminals are targeting smaller organisations. This makes small and medium-sized enterprises (SMBs) hard to find. They are also working with smaller budgets and staff constraints in the face of a long list of cyber threats,

[ Read More ]

IoT Cybersecurity Is Still Very Problematic

In our past article, we have discussed the flaws affecting an obscure embedded OS, which happens to be one of the most successful operating systems in history, while at the same time remained hidden from most users, VxWorks. We are in the middle of a major shift in computing, as competition for the standard operating

[ Read More ]

Mitrecorp Issues Fake Vulnerability Bug Report For VLC Player

CERT-Bund has issued a critical advisory regarding an alleged persistent vulnerability in all versions of VLC Player from version 3.0.7.1 and older. VLC Player is a very popular cross platform open source media player with versions available in Windows, Linux, MacOS, iOS, Android and Unix. The bug has something to do with buffer over-read, connected

[ Read More ]

Comprehensive Cybersecurity Plan, A Must For Firms

Cyber ​​attacks are changing with the times. Initially, personal cyber-attacks were nothing but digital vandalism, seeking for 15-minutes of fame were mainstream, but the people behind the attacks today shifted to economic reason why they are into it – for money. They target organizations, important infrastructures, and state agencies, the incidents became increasingly sophisticated, complicated

[ Read More ]

Are Companies Still Doubting Cloud-Computing?

The 2019 Access Management Index report revealed by Thales has provided a quick glimpse of how corporations’ top IT decision makers are coping with cloud-computing push by the industry. 49% of the 1050 IT corporate leaders suggest that they will not embrace cloud computing at this time, due to the issue of becoming a target

[ Read More ]

Fundamentals Of A DDoS Attack

Distributed Denial of Service Attack (DDoS) is a critical cybersecurity concern that causes a service to stop by sending numerous processing requests from multiple computers to a target server over the network. DDoS basically is an expansion of the DoS attack, when multiple computers make simultaneously request service from a certain target in an effort

[ Read More ]

Myths In Cybersecurity That People Needs To Forget

Cyber attacks come in various presentation and packages, the damage range from “all systems feel normal” to “the sky is falling” scenarios. But one thing is for sure, users of all access levels, from system admins to end-users and consumers have a large role to play for the success or failure of cyber attacks perpetuated.

[ Read More ]

BEC Scams, A Profitable Phishing Technique

Only a few groups in the cybersecurity industry know or even heard the name “Scattered Canary”, it is considered as a “cyber-gang” with at least a dozen members set to issue targeted BEC (Business Email Compromise) campaigns. Scattered Canary started its operations more than ten years ago, with only a few members, the team targeted

[ Read More ]

Drone Technology a Rising Threat to Cybersecurity

Drones have become immensely popular all across the world and today drones can be bought and flown by anyone. People use drones for different purposes, ranging from filmmaking and photography to surveillance and agriculture. The trend to use drones for delivering packages and to ship medical samples is also picking up. Well, for any technology,

[ Read More ]

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]