Remember what they said in school? “Nobody likes a tattletale.” This old adage is especially true for the U.S. government who depends on secrecy to operate. Things just work a whole lot better when everyone knows exactly what they should, and no one asks any difficult questions. The government claims to protect its citizens—and sometimes
In the U.S. and Canada, the first Monday of September is dedicated to Labor Day, a public holiday established to honor the social and economic achievements of hard working Americans throughout history. According to the U.S. Department of Labor (DOL), the event recognizes how the average employee has directly contributed to the current strength and prosperity
Similar to Japan, Australia is one of the few countries with a growing elderly population—and even though both economies are stable and strong, this reality will soon need some attention. For Australians, one of the biggest threats to their future is the lack of younger, skilled cybersecurity professionals who can uphold industry best practices. The
Director of National Intelligence, Dan Coats revealed in a recent threat update issued by the American Intelligence Community (IC) that the U.S. government has launched several investigations looking into the cyber-warfare tactics deployed by foreign states. In a speech addressed to the Hudson Institute, Coats spoke about Russian involvement in recent attacks and labeled the country
Turn out, 2017 was a crazy year for data breaches. No one can forget the massive Equifax disaster, which exposed the sensitive information of millions of customers to cybercriminals around the world. And of course, there was the attack on the Republican National Committee which leaked personal data of over 200 million American voters. Oh,
A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any
Stolen bank details, credit card info, and plenty of other damaging information are now for open sale on the dark web—it’s no secret. For a few years now, it has been the place to trade illegal merchandise of all kinds, including the personal information of those scammed by phishing attacks and similar exploits. While this realization
In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
Of all the digital threats organizations are facing today, nothing beats the worst of the worst, otherwise known as human error. Data theft, information leaks, virus infections, spear phishing, spam, identity theft, corporate espionage, and the latest, cryptojacking infections are now all working together to compromise the systems and steal the data of online businesses.
The cryptocurrency trading scene now defines the old adage, “every man for himself.” Without any form of government or state-backed regulation, a blockchain-based currency such as Bitcoin and its derivatives must rely solely on speculation to assess the flow of trading. With all the recent interest in this form of trading and the nature of their