Cybersecurity

Chinese Scammers Use Social Engineering to Swindle $18.6M

Fraud transaction through clever social engineering enabled Chinese phishers in successfully swindling an estimated $18.6 million from Tecnimont SpA’s Indian branch. With a cleverly written email that heavily resembles Pierrorberto Folgiero’s (the company’s Group CEO) was sent to Tecnimont Pvt Ltd, the phishers were able to persuade decision makers in the company’s India office to

[ Read More ]

Use Security Technology to Improve Business Operations

Security technology would continue to be as important for businesses in 2019 as it was in 2018; in fact, it would be much more important in 2019 than it was in 2018. As we know, security technology today is integral to business operations and contributes greatly to the continuity of any business and its operational

[ Read More ]

Some of the Worst Passwords of 2018

Cybersecurity experts always advocate for a strong and unique password, and it is one of their top priority. They also continually identify the different patterns that make a strong, unique password. However, not many take this recommendation seriously, because they think it is difficult to remember or they are not able to come up with

[ Read More ]

NZ Transport Agency’s Missing USB Drive a Major Data Breach

The New Zealand’s Transportation Agency is in the hot seat as a very important USB flash drive containing personal information of at least 1,000 of their employees is missing. Usually, personnel information is stored cryptographically locked in a secure server, however, due to the need to produce identification cards for 1,000+ employees, it needs to

[ Read More ]

Idaho National Laboratory: A Covert Anti-Cybercrime Lab

The United States as a nation knows how to maximize its resources, that is one of the main advantages she has compared to other industrialized nations. The ‘double duty’ of a government agency or installation is usually done covertly in order not to attract attention, both internal and external. As cybersecurity defense needs grew not

[ Read More ]

Biology and Computer Science:

The Singularity is Near. Ray Kurzweil published this seminal book in 2005 capturing the attention of technologists for his predictions and even philosophers contending with what this meant for the human condition. In 2006, the tech-talk across the industry was of the coming Web 3.0. We were fixated on the internet, but Kurzweil went far

[ Read More ]

Iranian Government Accused of Phishing-Based Cyber Espionage

State-sponsors hackers have been in the news for quite a while. With former NSA contractor, Edward Snowden exposed NSA’s Prism operation in 2012, basically a global espionage. The Lazarus group allegedly connected with North Korean regime, accused of being responsible for the Sony Pictures of America data breach of 2014 and WannaCry ransomware attacks of

[ Read More ]

2018 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Saipem after the Unauthorized Remote Access Incident

Saipem, the contractor of two big oil refineries, Duqm (based in UAE) and Saudi Aramco (headquartered in Saudi Arabia) has publicly announced that it was a victim of a cyber attack last December 10, 2018. Unauthorized users were able to penetrate the servers, but fortunately, failed to get a hold of the data stored on

[ Read More ]