Not only has the 21st century introduced a whole new way thinking about the world, it has forced people living in big cities to change their collective mindset. The rise of “smart cities,” complete with their various types of electronic data collection sensors and information-gathering resources, has dramatically altered the attack vector on the people
The average person in the world today keeps a ton of “stuff” on their smartphone. Gone are the days when making a call was the only thing you could do—now there’s basically nothing you can’t do on your mobile device—aside from keeping it completely safe, that is. Emailing, banking, shopping, it’s all right there at
A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any
In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
Of all the digital threats organizations are facing today, nothing beats the worst of the worst, otherwise known as human error. Data theft, information leaks, virus infections, spear phishing, spam, identity theft, corporate espionage, and the latest, cryptojacking infections are now all working together to compromise the systems and steal the data of online businesses.
As part of the world’s biggest public network, the darknet is not for the faint-of-heart and should be treated as a highly volatile digital environment. Not only is it not accessible through a regular browser and mainstream internet connection—it contains vulnerabilities we haven’t even begun to image. It is not hidden because of secrecy, but
The recent implementation of GDPR and the race for increased corporate compliance with issues of privacy has generated a lot of noise in the cybersecurity industry, most of which stems from a lack of overall understanding about the new measures—and what they mean for the future of online business. An article recently published by Motherboard suggests
When it comes to keeping business running smoothly, corporate board-of-directors need to be proactive, especially nowadays. This includes supporting the infrastructure that handles the organization’s digital data, storage, and utilization. Not long ago, a company’s Chief Technology Officer (CTO) or Chief Information Officer (CIO) was the central authority in IT decisions; however, that role has
Recent reports claimed that Rakhni, a ransomware strain, has developed a new coinminer component that allows it to sneak into the funds of Bitcoin users. Rakhni is said to have the ability to lurk around a targeted computer before inflicting an attack. It then can either infect a computer right after sneaking in or run
Remote access may give employees the ability to access work-related data without being physically present, but it also puts them at risk of losing it all. Because anyone will have the power to access the organizational network when remote access is enabled, it becomes a potential target for cyber crimes that can compromise the network