Cybersecurity

Australia VS Huawei Devices Storyline Never Die

The political propaganda against Huawei devices continues in the land down under, as the Australian Foreign Minister Marise Payne has ruled that the ban against Huawei’s 5G devices will continue to be implemented by the federal government. “We have taken the strongest advice from intelligence agencies in this country, the strongest technical advice as to

[ Read More ]

CISO’s Role For Cybersecurity Readiness, Highlighted By Cisco

We are in the paradigm shift when the majority of companies, slowly but surely embracing cloud computing and cloud apps platforms. Cisco’s CISO Benchmark Study 2019 is a global survey participated and represented by 18 countries with 3,200 participants, majority of whom are leaders in the IT field, across many industries from SMEs to multinational

[ Read More ]

Legacy Systems And Cybersecurity, A Difficult Reality

Maintenance and continued use of legacy systems by many corporate entities today make the goal of cybersecurity for the world today a tall order. As organizations are transitioning to new systems, the old systems remain running in order to maintain their clients under their current business model. Of course, the reliability of the old system

[ Read More ]

QBot Malware, Dozen Years Wreaking Havoc In the Wild

For decades now, security experts have advised the public never open attachments coming from emails from unverified sources. Unfortunately, this sane reminder has been ignored by many users as long as email systems first became a communication tool in the 1970s. Fast forward in this year 2019, malware infection due to opening attachments in emails

[ Read More ]

4 Ways To Address Cybersecurity Gaps For An SME

Multinational and large enterprises have no trouble with beefing-up their cybersecurity defense as those organizations have deep pockets, and a bad incident of a cyber attack can overnight cripple their business and their brands. Unfortunately, in the global scale, it is the SME’s (Small and Medium Enterprises) that employs the majority of the working population.

[ Read More ]

DDoS-For-Hire Suspect in Chicago, Pleaded Guilty

Threat actors, for all intents and purposes, are wise individuals. They have advanced minds and they always try to be a step ahead when it comes to covering their tracks before authorities and investigators complete the puzzle. Unfortunately, for some of them, they have not yet reached the art of cover-up as they leave their

[ Read More ]

Hackers Now Target Porn Site Users to Steal Their Credentials

Hackers now target porn website users, especially PornHub and XNXX users accounts and get away with their login credentials. This kind of hacking, as per security experts, has nothing strange about it. Pornography, despite many ongoing campaigns to decrease online pornographic content and traffic, remains one of the most popular and sought-after kinds of online

[ Read More ]

19-Year-Old WinRAR Bug That Lets Install Malware in Computers

A 19-year-old security flaw, which lets hackers install malware in systems, has been detected in WinRAR, the popular Windows file archival tool. WinRAR, which has been popular as a powerful archive manager for over two decades now, is used for backing up data, compressing files and thus reducing the size of email attachments, decompressing files

[ Read More ]

Canadian Banks and Government Institutions Targeted By Foreign Hackers

A leading Cybersecurity analyst tells MPs that foreign hackers have targeted Canadian banks, mining companies, and government institutions to steal information and infect the system with malware. Christopher Porter, the chief intelligence strategist at security firm FireEye, says in February 2017 multiple major Canadian financial institutions were exposed to the risk of state-sponsored cybertheft from

[ Read More ]

Cyber Security Is A Culture That Needs To Be Practiced

The biggest weakness of security breaches are the people, but at the same time, they can also be your organization’s biggest defence. The massive telecom data breach, stolen credentials, data compromised are some of the daily issues that we see these days. All of these major breaches resulted from mistakes of individuals. Despite years of

[ Read More ]