Cybersecurity

Microsoft and Its Desire To Secure Global IoT Devices

The Microsoft Security Research and Defense (MSRD) team has issued a cybersecurity warning about the growing concerns of IoT (Internet-of-Things) security, especially botnet infections in their official blog. Redmond highlighted that IoT devices is forecasted to grow as much as 50-billion installations globally, with many devices having identified with security and privacy flaws fresh from

[ Read More ]

IoT Cybersecurity Is Still Very Problematic

In our past article, we have discussed the flaws affecting an obscure embedded OS, which happens to be one of the most successful operating systems in history, while at the same time remained hidden from most users, VxWorks. We are in the middle of a major shift in computing, as competition for the standard operating

[ Read More ]

Four Fundamental Network Security Tips But Often Ignored

We cannot make someone reads our article to become a CCNA-level network administrator anytime soon. Networking is hard, with various protocols, wiring standards and other critical parts that need to work hand-in-hand to even enable a transfer of PING packets. Take a look at the basics of the seven layers of the OSI model, to

[ Read More ]

Personal Information Of Million Bulgarians Taxpayers Stolen

Bulgaria, an Eastern European country of 7 million people is a recent victim of a large-scale data breach, as its state tax agency’s tax information storage servers were hacked last June 2019. No other than its Minister of Finance, Vladislav Goranov issued a public apology for the incident that happened under his watch. Security researchers

[ Read More ]

Alternative Secure Email Infra For The Enterprise

Firms should always consider the worst-case scenario in their internal IT environment. The need to put in place procedures in the event of a disaster, and periodically update these procedures in order to be relevant to the current trends. IT leaders need to devise ways, a detailed description of what to do when the malware

[ Read More ]

Fundamentals Of A DDoS Attack

Distributed Denial of Service Attack (DDoS) is a critical cybersecurity concern that causes a service to stop by sending numerous processing requests from multiple computers to a target server over the network. DDoS basically is an expansion of the DoS attack, when multiple computers make simultaneously request service from a certain target in an effort

[ Read More ]

Myths In Cybersecurity That People Needs To Forget

Cyber attacks come in various presentation and packages, the damage range from “all systems feel normal” to “the sky is falling” scenarios. But one thing is for sure, users of all access levels, from system admins to end-users and consumers have a large role to play for the success or failure of cyber attacks perpetuated.

[ Read More ]

The Forgotten IT Security Aspects Of Healthcare Firms

The Healthcare sector’s continued problem with cybersecurity vulnerabilities will continue for many years to come. As long as their equipment follows the principle of “use it until it physically breaks down.” In the world of IT, such a process does not work from the standpoint of security and privacy, especially in the aspect of the

[ Read More ]

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

Australia’s University Of Wollongong Cyber Attack Ready

Australia’s University of Wollongong (UOW) is taking strong defensive measures against cyber attacks in anticipation of its eventuality said by its spokesperson this week. This is through an effective lessening of the attack surface of University computers and Internet-connected devices as well as regular penetration testing, continued cybersecurity training for University staff and IT security

[ Read More ]