Cybersecurity

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]

Major IT Issues: Threats Posed By Mobile Fraud & Account Theft

Smartphones and other mobile devices such as tablets and smartwatches are fast becoming more “personal computers” than the PC. People interact with these devices and store more personally identifiable information in them more than any laptop or desktop computer. In today’s technology-driven world, even the first thing to do after waking-up is checking the notification

[ Read More ]

Why The Worst Data Breaches Of 2019 Might Look Like A Nightmare

The year 2018 has seen companies hit with sizable fines and settlements due to data breaches. For example, Uber’s poor handling of its 2016 breach cost the company close to $150 million. And weakly protected, heavily-regulated health data has cost medical facilities big money, resulting in increasingly large fines from the U.S. Department of Health

[ Read More ]

2019 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Some of the Worst Passwords of 2019

Cybersecurity experts always advocate for a strong and unique password, and it is one of their top priority. They also continually identify the different patterns that make a strong, unique password. However, not many take this recommendation seriously, because they think it is difficult to remember or they are not able to come up with

[ Read More ]

Is China Racial-Profiling Its Minority?

Mainland China has already started its massive facial database of all mainland Chinese citizens and possibly permanent residents of the country as well. Beijing is keen on monitoring the movements of people in the mainland. This is the key to transform China into a cohesive unit, with the opposition to the ruling leaders in Beijing

[ Read More ]

Minnesota’s Department of Human Service, Latest Victim Of Phishing

Minnesota’s Department of Human Services (DHS) headed by its Commissioner Tony Lourey has issued a document to both houses of Congress detailing its data breach happened with the department affecting 11,000 people. It only took the hackers to persuade a DHS employee in opening an “invoice” email, and the department normally receives 92,500 phishing/spam emails

[ Read More ]

Triton Hacker Group Attacks Saudi Petrochemical Company Again

FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual

[ Read More ]

A Quick Glimpse Of Hong Kong’s Cybersecurity Readiness

The Hong Kong Special Administrative Region has governed under a One-China, Two-systems policy since 1997. That means the great firewall of China which is enforced in the mainland is not applied in Hong Kong. It decides on its own about its internal policies when it comes to governance, including the responsibility of making sure that

[ Read More ]

Top 10 Misconceptions In Cybersecurity

Cybersecurity is a big word that is being used by IT professionals and the mainstream media nowadays, unfortunately, the latter still lack understanding on how to explain it to common people. There is a gap between how the cybersecurity vendor markets their products and services vs how the mainstream media handle the reports as if

[ Read More ]