Cyber warfare

Cyberwarfare progresses while people are busy with the Covid19 smokescreen

We are not denying the seriousness of Covid19 possible implications. Instead, we are looking behind this transitory pandemic smokescreen that hides potentially much bigger global problem – progressing cyberwarfare. Cyberwarfare, what it is? Like with many other terms, there is still worldwide debate if cyberwarfare exists. For those convinced that such a war exists, the […]

Botnets as cybercriminals’ viable option in the emerging economic crisis

Most botnets are currently deployed for the distributed denial-of-service (DDoS) attacks but can also be used for delivering spyware, email spam, phishing, ‘click fraud’, stilling confidential information or the bitcoin mining. Looming economic crisis The world has changed dramatically in the three months since our last update of the World Economic Outlook in January, warns […]

Cybersecurity pandemic

The Corona Pandemic Lesson to Global Cybersecurity

What the cybercrime, cyberwarfare and cyberterrorism have in common with the corona pandemic? At least one thing: all of them are global threats that cannot be fought individually but cooperatively. The Coronavirus is hitting hard on the world’s economy, creating a high volume of uncertainty within organisations. Cynet has revealed new data, showing that the […]

Data_breach_No_business_sorry

Data breach? Not doing business with you, sorry…

Almost one in four Americans stop doing business with companies who have been hacked, and more than two in three people trust a company less after a data breach, reported ZD Net. The data breach trend Today’s economy thrives on disruption. Unless you maintain quality services and keep up with technology, you are likely to […]

Protecting Critical Infrastructure and Human Error

Protecting Critical Infrastructure: It is proven, technology is not enough

A segmentation of the Information Technology and Operational Technology networks would not be able to protect critical infrastructure if humans remain incapacitated and continue making errors.  The US Cybersecurity and Infrastructure Agency (CISA) recently reported that it had responded to the ransomware attack on a natural gas facility, forcing it to shut it down for […]

Senor_scam

Seniors – the Internet Scams Soft Targets

The scenario We are witnessing increasingly aggressive email scams targeting all kinds of Internet users who utilise security cameras. For example, it was recently reported that 1,600 scam emails of this type were intercepted between 2 and 3 January this year. Being a one of still not sufficiently secured the Internet of Thing devices, these […]

The Cybercrime Treaty vs Hack Back Bill

There are two conflicting cybercrime regulations in the making, one national and the other one international. Which one deserves to be supported and why should you know this? National: Hack back Bill The US Congress has been considering a law relating to cybersecurity defence named as ‘Active Cyber Defense Certainty Act’ (ACDC). This proposed bill […]

Computing on the Edge: How secure it is?

The Business Insider recently announced that there are about 10 billion connected IoT devices in 2018 and predicted that there will be 64 billion of these devices in use by 2026. The vast majority of these devices are or will be connected to the edge computing networks. But how secure it is?   Computing on […]

Third-party risk

Cybersecurity quandary: Is the third party betraying us?

The survey concludes that although nearly 80% of respondents believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years. Few organizations are, however, prepared to mitigate the risks. Is, then, a third party betraying us or we are just inattentive? This issue must, anyway, […]

5G security: Is the cheese already moved?

With 5G just around the corner, it seems that people are struggling to understand all its facets – including cybersecurity. The 5G brings far-reaching changes, significantly different from previous generations of mobile communication networks as it will cause major modifications in technology and network architecture. This architecture will connect an enormous volume of the internet […]