Cybersecurity

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

Australia’s University Of Wollongong Cyber Attack Ready

Australia’s University of Wollongong (UOW) is taking strong defensive measures against cyber attacks in anticipation of its eventuality said by its spokesperson this week. This is through an effective lessening of the attack surface of University computers and Internet-connected devices as well as regular penetration testing, continued cybersecurity training for University staff and IT security

[ Read More ]

How to Keep Your Business Protected From Cyber Attack

On May 6, 2019, the city of Washington, Pennsylvania, suffered a malware attack that shut down its phone and messaging system for more than a week. The only exception is the 911 system, which operates throughout the county and continues to be available to residents of the city. This type of ransomware attack can occur

[ Read More ]

BEC Scams, A Profitable Phishing Technique

Only a few groups in the cybersecurity industry know or even heard the name “Scattered Canary”, it is considered as a “cyber-gang” with at least a dozen members set to issue targeted BEC (Business Email Compromise) campaigns. Scattered Canary started its operations more than ten years ago, with only a few members, the team targeted

[ Read More ]

WannaCry In 2019? Yes, WannaCry Is Still Here

Two years ago in 2017, the world was caught off guard by a very destructive ransomware named WannaCry. With its infection success rate, estimates revealed that ransom payment for WannaCry went up to $4 billion that year. The NSA’s former top secret weaponized bug in SMB (Server Message Block) version 1 went to the wrong

[ Read More ]

How Companies Can Mitigate Supply-Chain Attacks?

The supply chain attack that is becoming a problem today refers mainly to the method of embedding malware and backdoor in the product itself, update programs, patch modules, etc., in light of the vulnerability of the software product supply chain. A legitimate software developer will not deliberately insert those features to the products they offer

[ Read More ]

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]

Major IT Issues: Threats Posed By Mobile Fraud & Account Theft

Smartphones and other mobile devices such as tablets and smartwatches are fast becoming more “personal computers” than the PC. People interact with these devices and store more personally identifiable information in them more than any laptop or desktop computer. In today’s technology-driven world, even the first thing to do after waking-up is checking the notification

[ Read More ]

Why The Worst Data Breaches Of 2019 Might Look Like A Nightmare

The year 2018 has seen companies hit with sizable fines and settlements due to data breaches. For example, Uber’s poor handling of its 2016 breach cost the company close to $150 million. And weakly protected, heavily-regulated health data has cost medical facilities big money, resulting in increasingly large fines from the U.S. Department of Health

[ Read More ]

2019 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]